6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0636969ef69dc00d943d9c08a203637c3397c2a0f0fcd66300f1a40a5647f41c4e14d6039400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001180)) [ 221.494395] audit: type=1326 audit(1536834193.737:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=11579 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:23:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) close(0xffffffffffffffff) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000600)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000080)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) 10:23:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) close(0xffffffffffffffff) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000600)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000080)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) 10:23:14 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:14 executing program 5: getuid() ioprio_set$uid(0x0, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000002c0)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='GPL\x00'}, 0x2d0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000080)) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 10:23:14 executing program 1: clock_getres(0x400000000000002, &(0x7f0000000400)) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000000180)}) geteuid() ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000180)=""/244) getegid() perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:23:14 executing program 2: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0636969ef69dc00d943d9c08a203637c3397c2a0f0fcd66300f1a40a5647f41c4e14d6039400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001180)) [ 222.393498] audit: type=1326 audit(1536834194.637:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=11612 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:23:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) close(0xffffffffffffffff) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000600)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000080)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) 10:23:14 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) close(0xffffffffffffffff) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000600)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000080)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) 10:23:14 executing program 5: getuid() ioprio_set$uid(0x0, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000002c0)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='GPL\x00'}, 0x2d0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000080)) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 10:23:15 executing program 1: clock_getres(0x400000000000002, &(0x7f0000000400)) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000000180)}) geteuid() ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000180)=""/244) getegid() perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:23:15 executing program 2: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0636969ef69dc00d943d9c08a203637c3397c2a0f0fcd66300f1a40a5647f41c4e14d6039400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000140)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001180)) [ 223.293409] audit: type=1326 audit(1536834195.537:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=11640 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 10:23:15 executing program 3: getuid() ioprio_set$uid(0x0, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000002c0)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='GPL\x00'}, 0x2d0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000080)) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 10:23:15 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:15 executing program 4: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:15 executing program 5: getuid() ioprio_set$uid(0x0, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000002c0)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='GPL\x00'}, 0x2d0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000080)) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 10:23:16 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:16 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:16 executing program 3: getuid() ioprio_set$uid(0x0, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000002c0)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='GPL\x00'}, 0x2d0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000080)) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 10:23:16 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:16 executing program 4: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:16 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:16 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:17 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:17 executing program 3: getuid() ioprio_set$uid(0x0, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000002c0)) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='GPL\x00'}, 0x2d0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000080)) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 10:23:17 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:17 executing program 4: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:17 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:17 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:18 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:18 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:18 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) close(0xffffffffffffffff) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000600)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000080)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) 10:23:18 executing program 5: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) close(0xffffffffffffffff) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000600)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000080)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) 10:23:19 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:19 executing program 5: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) eventfd(0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:23:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 10:23:19 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:19 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:20 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) timer_create(0x0, &(0x7f0000000840)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) timerfd_create(0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000680), 0x4) fstatfs(0xffffffffffffffff, &(0x7f00000008c0)=""/19) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000006c0)) bind$netlink(0xffffffffffffffff, &(0x7f0000000380), 0xc) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) sched_setscheduler(0x0, 0x0, &(0x7f00000005c0)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000980)) migrate_pages(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setptracer(0x59616d61, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") membarrier(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000580)='/dev/md0\x00', 0x0, 0x0) 10:23:20 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000002e80), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x2000000000000012, &(0x7f0000000340)}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) close(0xffffffffffffffff) getpid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000600)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000080)) sched_setscheduler(0x0, 0x0, &(0x7f0000000140)) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) 10:23:20 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:20 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:20 executing program 5: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) eventfd(0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:23:20 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:20 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:20 executing program 0: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) eventfd(0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:23:20 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:20 executing program 1: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) eventfd(0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:23:20 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:21 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:21 executing program 3: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), 0xfffffffffffffffd) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgroups(0x0, &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001d00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001f80)) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003500)) getuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getgid() getpgid(0x0) stat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) getegid() getpid() lstat(&(0x7f0000004e80)='./file0/file0\x00', &(0x7f0000004ec0)) fstat(0xffffffffffffffff, &(0x7f0000004f40)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004fc0), &(0x7f0000005000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005040)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fc2503e231d0233b2e251087bebc9df5", 0x10) 10:23:21 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffffffffff49) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) 10:23:21 executing program 4: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) 10:23:21 executing program 5: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) eventfd(0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:23:21 executing program 2: futex(&(0x7f0000000140), 0xc, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000000c0)=0x60) syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000540), 0x2) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000180)}, 0x10) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) prctl$setptracer(0x59616d61, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 10:23:21 executing program 4: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) 10:23:21 executing program 0: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) eventfd(0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:23:21 executing program 4: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) 10:23:21 executing program 1: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) eventfd(0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:23:21 executing program 4: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) 10:23:21 executing program 4: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) 10:23:22 executing program 4: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) 10:23:22 executing program 3: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), 0xfffffffffffffffd) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgroups(0x0, &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001d00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001f80)) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003500)) getuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getgid() getpgid(0x0) stat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) getegid() getpid() lstat(&(0x7f0000004e80)='./file0/file0\x00', &(0x7f0000004ec0)) fstat(0xffffffffffffffff, &(0x7f0000004f40)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004fc0), &(0x7f0000005000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005040)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fc2503e231d0233b2e251087bebc9df5", 0x10) 10:23:22 executing program 4: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) 10:23:22 executing program 4: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), 0xfffffffffffffffd) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgroups(0x0, &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001d00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001f80)) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003500)) getuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getgid() getpgid(0x0) stat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) getegid() getpid() lstat(&(0x7f0000004e80)='./file0/file0\x00', &(0x7f0000004ec0)) fstat(0xffffffffffffffff, &(0x7f0000004f40)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004fc0), &(0x7f0000005000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005040)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fc2503e231d0233b2e251087bebc9df5", 0x10) 10:23:22 executing program 5: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) eventfd(0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:23:22 executing program 2: futex(&(0x7f0000000140), 0xc, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000000c0)=0x60) syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000540), 0x2) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000180)}, 0x10) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) prctl$setptracer(0x59616d61, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 10:23:22 executing program 0: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) eventfd(0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:23:22 executing program 1: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140), &(0x7f0000000180)='/dev/ppp\x00', 0xfffffffffffffff8) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b73e0f12cf9f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000200)) eventfd(0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:23:23 executing program 3: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), 0xfffffffffffffffd) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgroups(0x0, &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001d00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001f80)) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003500)) getuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getgid() getpgid(0x0) stat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) getegid() getpid() lstat(&(0x7f0000004e80)='./file0/file0\x00', &(0x7f0000004ec0)) fstat(0xffffffffffffffff, &(0x7f0000004f40)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004fc0), &(0x7f0000005000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005040)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fc2503e231d0233b2e251087bebc9df5", 0x10) 10:23:23 executing program 4: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), 0xfffffffffffffffd) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgroups(0x0, &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001d00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001f80)) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003500)) getuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getgid() getpgid(0x0) stat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) getegid() getpid() lstat(&(0x7f0000004e80)='./file0/file0\x00', &(0x7f0000004ec0)) fstat(0xffffffffffffffff, &(0x7f0000004f40)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004fc0), &(0x7f0000005000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005040)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fc2503e231d0233b2e251087bebc9df5", 0x10) 10:23:23 executing program 5: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), 0xfffffffffffffffd) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgroups(0x0, &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001d00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001f80)) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003500)) getuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getgid() getpgid(0x0) stat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) getegid() getpid() lstat(&(0x7f0000004e80)='./file0/file0\x00', &(0x7f0000004ec0)) fstat(0xffffffffffffffff, &(0x7f0000004f40)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004fc0), &(0x7f0000005000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005040)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fc2503e231d0233b2e251087bebc9df5", 0x10) 10:23:23 executing program 0: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) 10:23:23 executing program 2: futex(&(0x7f0000000140), 0xc, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000000c0)=0x60) syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000540), 0x2) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000180)}, 0x10) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) prctl$setptracer(0x59616d61, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 10:23:23 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x301e, 0xfffffffffffffffb, 0x2012, r0, 0x0) 10:23:23 executing program 0: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) [ 231.345606] audit: type=1400 audit(1536834203.587:24): avc: denied { map } for pid=11955 comm="syz-executor1" path="/dev/dsp1" dev="devtmpfs" ino=1938 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 10:23:23 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x301e, 0xfffffffffffffffb, 0x2012, r0, 0x0) 10:23:23 executing program 0: rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) 10:23:23 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x301e, 0xfffffffffffffffb, 0x2012, r0, 0x0) 10:23:23 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x301e, 0xfffffffffffffffb, 0x2012, r0, 0x0) 10:23:23 executing program 3: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), 0xfffffffffffffffd) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgroups(0x0, &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001d00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001f80)) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003500)) getuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getgid() getpgid(0x0) stat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) getegid() getpid() lstat(&(0x7f0000004e80)='./file0/file0\x00', &(0x7f0000004ec0)) fstat(0xffffffffffffffff, &(0x7f0000004f40)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004fc0), &(0x7f0000005000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005040)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fc2503e231d0233b2e251087bebc9df5", 0x10) 10:23:24 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x301e, 0xfffffffffffffffb, 0x2012, r0, 0x0) 10:23:24 executing program 4: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), 0xfffffffffffffffd) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgroups(0x0, &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001d00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001f80)) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003500)) getuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getgid() getpgid(0x0) stat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) getegid() getpid() lstat(&(0x7f0000004e80)='./file0/file0\x00', &(0x7f0000004ec0)) fstat(0xffffffffffffffff, &(0x7f0000004f40)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004fc0), &(0x7f0000005000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005040)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fc2503e231d0233b2e251087bebc9df5", 0x10) 10:23:24 executing program 5: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), 0xfffffffffffffffd) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgroups(0x0, &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001d00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001f80)) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003500)) getuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getgid() getpgid(0x0) stat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) getegid() getpid() lstat(&(0x7f0000004e80)='./file0/file0\x00', &(0x7f0000004ec0)) fstat(0xffffffffffffffff, &(0x7f0000004f40)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004fc0), &(0x7f0000005000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005040)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fc2503e231d0233b2e251087bebc9df5", 0x10) 10:23:24 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x301e, 0xfffffffffffffffb, 0x2012, r0, 0x0) 10:23:24 executing program 2: futex(&(0x7f0000000140), 0xc, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000000c0)=0x60) syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000540), 0x2) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000280)={0x0, &(0x7f0000000180)}, 0x10) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000080)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) prctl$setptracer(0x59616d61, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 10:23:24 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fsetxattr(r0, &(0x7f0000000100)=@known='security.selinux\x00', &(0x7f0000000240)='\x00', 0x1, 0x0) 10:23:24 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x301e, 0xfffffffffffffffb, 0x2012, r0, 0x0) 10:23:24 executing program 0: prctl$setname(0x24, &(0x7f00000000c0)='/dev/full\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff}, 0xc) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='\x00\x00\x00\x00\x00', 0x0, &(0x7f00000009c0)) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='.', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000700)) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000400)={0x18, 0x0, {0x0, @broadcast, 'veth1_to_team\x00'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000440)) dup2(0xffffffffffffffff, 0xffffffffffffffff) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) 10:23:24 executing program 3: ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000001040)=ANY=[]) 10:23:25 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fsetxattr(r0, &(0x7f0000000100)=@known='security.selinux\x00', &(0x7f0000000240)='\x00', 0x1, 0x0) 10:23:25 executing program 5: keyctl$session_to_parent(0x12) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), 0xfffffffffffffffd) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in6, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001040)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000001280)=0xe8) lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) getresuid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) getgroups(0x0, &(0x7f00000014c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@remote, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000001640)=0xe8) getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001d00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@mcast2, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001e80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001f40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001f80)) fstat(0xffffffffffffffff, &(0x7f0000001fc0)) getresgid(&(0x7f0000002040), &(0x7f0000002080), &(0x7f00000020c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003500)) getuid() fstat(0xffffffffffffffff, &(0x7f0000003540)) getpgrp(0xffffffffffffffff) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getgid() getpgid(0x0) stat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) getgid() getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d40), &(0x7f0000004d80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) getegid() getpid() lstat(&(0x7f0000004e80)='./file0/file0\x00', &(0x7f0000004ec0)) fstat(0xffffffffffffffff, &(0x7f0000004f40)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004fc0), &(0x7f0000005000)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005040)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005480), 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fc2503e231d0233b2e251087bebc9df5", 0x10) 10:23:25 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fsetxattr(r0, &(0x7f0000000100)=@known='security.selinux\x00', &(0x7f0000000240)='\x00', 0x1, 0x0) 10:23:25 executing program 2: dup(0xffffffffffffff9c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) readlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=""/219, 0xdb) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)={@host}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000001c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000280)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @local}, 'bcsf0\x00'}) 10:23:25 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fsetxattr(r0, &(0x7f0000000100)=@known='security.selinux\x00', &(0x7f0000000240)='\x00', 0x1, 0x0) 10:23:25 executing program 0: prctl$setname(0x24, &(0x7f00000000c0)='/dev/full\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff}, 0xc) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='\x00\x00\x00\x00\x00', 0x0, &(0x7f00000009c0)) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='.', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000700)) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000400)={0x18, 0x0, {0x0, @broadcast, 'veth1_to_team\x00'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000440)) dup2(0xffffffffffffffff, 0xffffffffffffffff) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) 10:23:25 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fsetxattr(r0, &(0x7f0000000100)=@known='security.selinux\x00', &(0x7f0000000240)='\x00', 0x1, 0x0) 10:23:25 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fsetxattr(r0, &(0x7f0000000100)=@known='security.selinux\x00', &(0x7f0000000240)='\x00', 0x1, 0x0) 10:23:25 executing program 3: ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000001040)=ANY=[]) 10:23:25 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fsetxattr(r0, &(0x7f0000000100)=@known='security.selinux\x00', &(0x7f0000000240)='\x00', 0x1, 0x0) 10:23:25 executing program 4: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:23:26 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000a00), &(0x7f0000000c00)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f00000007c0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000940)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a40)) geteuid() ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c80326b378dcdb7f79e70ba97ce1042c6f31f164abefd31956025bc804b24cce86243df9daf89b9650b591ff914a948ef72b9c5ac3e38a5823a7f2a4bbf1d73", "7b0c0c9ac3bbd39e3f5ca4f464a23379b1c26d861e42c639b2a54817a13c0ea9"}) getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0), 0x0, &(0x7f0000000a80)=ANY=[]}, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000980)={'IDLETIMER\x00'}, &(0x7f00000009c0)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:23:26 executing program 2: dup(0xffffffffffffff9c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) readlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=""/219, 0xdb) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)={@host}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000001c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000280)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @local}, 'bcsf0\x00'}) 10:23:26 executing program 0: prctl$setname(0x24, &(0x7f00000000c0)='/dev/full\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff}, 0xc) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='\x00\x00\x00\x00\x00', 0x0, &(0x7f00000009c0)) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='.', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000700)) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000400)={0x18, 0x0, {0x0, @broadcast, 'veth1_to_team\x00'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000440)) dup2(0xffffffffffffffff, 0xffffffffffffffff) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) 10:23:26 executing program 1: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:26 executing program 3: ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000001040)=ANY=[]) 10:23:26 executing program 4: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:23:27 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000a00), &(0x7f0000000c00)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f00000007c0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000940)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a40)) geteuid() ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c80326b378dcdb7f79e70ba97ce1042c6f31f164abefd31956025bc804b24cce86243df9daf89b9650b591ff914a948ef72b9c5ac3e38a5823a7f2a4bbf1d73", "7b0c0c9ac3bbd39e3f5ca4f464a23379b1c26d861e42c639b2a54817a13c0ea9"}) getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0), 0x0, &(0x7f0000000a80)=ANY=[]}, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000980)={'IDLETIMER\x00'}, &(0x7f00000009c0)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:23:27 executing program 2: dup(0xffffffffffffff9c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) readlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=""/219, 0xdb) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)={@host}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000001c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000280)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @local}, 'bcsf0\x00'}) 10:23:27 executing program 0: prctl$setname(0x24, &(0x7f00000000c0)='/dev/full\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff}, 0xc) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='\x00\x00\x00\x00\x00', 0x0, &(0x7f00000009c0)) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='.', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000700)) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000400)={0x18, 0x0, {0x0, @broadcast, 'veth1_to_team\x00'}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000440)) dup2(0xffffffffffffffff, 0xffffffffffffffff) faccessat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) 10:23:27 executing program 1: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:27 executing program 3: ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000001040)=ANY=[]) 10:23:27 executing program 4: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:23:27 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000a00), &(0x7f0000000c00)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f00000007c0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000940)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a40)) geteuid() ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c80326b378dcdb7f79e70ba97ce1042c6f31f164abefd31956025bc804b24cce86243df9daf89b9650b591ff914a948ef72b9c5ac3e38a5823a7f2a4bbf1d73", "7b0c0c9ac3bbd39e3f5ca4f464a23379b1c26d861e42c639b2a54817a13c0ea9"}) getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0), 0x0, &(0x7f0000000a80)=ANY=[]}, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000980)={'IDLETIMER\x00'}, &(0x7f00000009c0)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:23:28 executing program 2: dup(0xffffffffffffff9c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) readlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=""/219, 0xdb) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)={@host}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f00000001c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000280)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @local}, 'bcsf0\x00'}) 10:23:28 executing program 0: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:28 executing program 1: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:28 executing program 3: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:28 executing program 4: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:23:28 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000a00), &(0x7f0000000c00)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f00000007c0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000940)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a40)) geteuid() ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c80326b378dcdb7f79e70ba97ce1042c6f31f164abefd31956025bc804b24cce86243df9daf89b9650b591ff914a948ef72b9c5ac3e38a5823a7f2a4bbf1d73", "7b0c0c9ac3bbd39e3f5ca4f464a23379b1c26d861e42c639b2a54817a13c0ea9"}) getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0), 0x0, &(0x7f0000000a80)=ANY=[]}, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000980)={'IDLETIMER\x00'}, &(0x7f00000009c0)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:23:29 executing program 2: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:29 executing program 0: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:29 executing program 1: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:29 executing program 3: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:29 executing program 4: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:29 executing program 5: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:29 executing program 2: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:30 executing program 0: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:30 executing program 1: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:30 executing program 3: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:30 executing program 4: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:30 executing program 5: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:30 executing program 2: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:31 executing program 0: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:31 executing program 1: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:31 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000a00), &(0x7f0000000c00)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f00000007c0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000940)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a40)) geteuid() ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c80326b378dcdb7f79e70ba97ce1042c6f31f164abefd31956025bc804b24cce86243df9daf89b9650b591ff914a948ef72b9c5ac3e38a5823a7f2a4bbf1d73", "7b0c0c9ac3bbd39e3f5ca4f464a23379b1c26d861e42c639b2a54817a13c0ea9"}) getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0), 0x0, &(0x7f0000000a80)=ANY=[]}, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000980)={'IDLETIMER\x00'}, &(0x7f00000009c0)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:23:31 executing program 4: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:31 executing program 5: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:31 executing program 2: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:23:31 executing program 0: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:32 executing program 1: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:32 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000a00), &(0x7f0000000c00)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f00000007c0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000940)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a40)) geteuid() ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c80326b378dcdb7f79e70ba97ce1042c6f31f164abefd31956025bc804b24cce86243df9daf89b9650b591ff914a948ef72b9c5ac3e38a5823a7f2a4bbf1d73", "7b0c0c9ac3bbd39e3f5ca4f464a23379b1c26d861e42c639b2a54817a13c0ea9"}) getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0), 0x0, &(0x7f0000000a80)=ANY=[]}, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000980)={'IDLETIMER\x00'}, &(0x7f00000009c0)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:23:32 executing program 4: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:23:32 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) getuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000080)={0xfffffffffffffff9}, 0x43) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000240)=""/26) 10:23:32 executing program 2: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:23:32 executing program 0: fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x2d0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 10:23:33 executing program 1: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:33 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000140)=""/194) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000a00), &(0x7f0000000c00)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f00000007c0)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000940)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a40)) geteuid() ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4c80326b378dcdb7f79e70ba97ce1042c6f31f164abefd31956025bc804b24cce86243df9daf89b9650b591ff914a948ef72b9c5ac3e38a5823a7f2a4bbf1d73", "7b0c0c9ac3bbd39e3f5ca4f464a23379b1c26d861e42c639b2a54817a13c0ea9"}) getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0), 0x0, &(0x7f0000000a80)=ANY=[]}, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000980)={'IDLETIMER\x00'}, &(0x7f00000009c0)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:23:33 executing program 4: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:23:33 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) getuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000080)={0xfffffffffffffff9}, 0x43) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000240)=""/26) 10:23:33 executing program 2: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:23:33 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x0) getuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000080)={0xfffffffffffffff9}, 0x43) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000240)=""/26) 10:23:33 executing program 3: unshare(0x8020000) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000000c0)=""/75) 10:23:33 executing program 1: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:34 executing program 4: clock_gettime(0xa8000000, &(0x7f00000001c0)) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000980)=ANY=[], 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 10:23:34 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) getuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000080)={0xfffffffffffffff9}, 0x43) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000240)=""/26) 10:23:34 executing program 2: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:34 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x0) getuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000080)={0xfffffffffffffff9}, 0x43) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000240)=""/26) 10:23:34 executing program 3: unshare(0x8020000) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000000c0)=""/75) 10:23:34 executing program 1: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:34 executing program 3: unshare(0x8020000) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000000c0)=""/75) 10:23:35 executing program 4: unshare(0x8020000) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000000c0)=""/75) 10:23:35 executing program 3: unshare(0x8020000) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000000c0)=""/75) 10:23:35 executing program 4: unshare(0x8020000) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000000c0)=""/75) 10:23:35 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) getuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000080)={0xfffffffffffffff9}, 0x43) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000240)=""/26) 10:23:35 executing program 2: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:35 executing program 0: creat(&(0x7f0000000040)='./file0\x00', 0x0) getuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000080)={0xfffffffffffffff9}, 0x43) clock_gettime(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x50, &(0x7f0000000140)}, 0x10) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000240)=""/26) 10:23:35 executing program 3: unshare(0x8020000) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000000c0)=""/75) 10:23:35 executing program 4: unshare(0x8020000) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000000c0)=""/75) 10:23:35 executing program 1: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:35 executing program 3: unshare(0x8020000) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000000c0)=""/75) 10:23:35 executing program 4: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:36 executing program 3: unshare(0x8020000) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000000c0)=""/75) 10:23:36 executing program 5: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:36 executing program 2: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:36 executing program 3: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:36 executing program 0: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:36 executing program 1: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:36 executing program 4: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:37 executing program 5: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:37 executing program 2: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:23:37 executing program 3: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:37 executing program 0: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:37 executing program 2: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:23:37 executing program 1: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:37 executing program 4: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:37 executing program 2: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:23:37 executing program 2: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:23:38 executing program 5: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:38 executing program 2: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:23:38 executing program 3: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:38 executing program 0: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:38 executing program 2: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:23:38 executing program 1: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000500), 0x10) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f00000000c0)}) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x15555774, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 10:23:38 executing program 4: clock_gettime(0x9, &(0x7f0000000cc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) gettid() getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0x65) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) geteuid() getresgid(&(0x7f0000000280), &(0x7f0000000200), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000c80)=0xf64d1131) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getegid() 10:23:38 executing program 2: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefa4e2179fbe5f5450f38c9365de0932ebc2ebc0d64ac1e5d9f7f") 10:23:38 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) [ 246.681975] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:23:39 executing program 5: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:39 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:39 executing program 5: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:39 executing program 0: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:39 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:39 executing program 0: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:39 executing program 5: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:39 executing program 4: clock_gettime(0x9, &(0x7f0000000cc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) gettid() getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0x65) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) geteuid() getresgid(&(0x7f0000000280), &(0x7f0000000200), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000c80)=0xf64d1131) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getegid() 10:23:39 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:39 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:39 executing program 0: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:39 executing program 5: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:39 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:39 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:39 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") [ 247.648233] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:23:40 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:40 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:40 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:40 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) [ 247.860218] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 247.886806] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 247.970199] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:23:40 executing program 4: clock_gettime(0x9, &(0x7f0000000cc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) gettid() getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0x65) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) geteuid() getresgid(&(0x7f0000000280), &(0x7f0000000200), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000c80)=0xf64d1131) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getegid() 10:23:40 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) [ 248.241767] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:23:40 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) [ 248.486534] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:23:40 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:40 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) [ 248.725541] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 248.762268] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:23:41 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) [ 248.838720] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:23:41 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:41 executing program 4: clock_gettime(0x9, &(0x7f0000000cc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) gettid() getresuid(&(0x7f00000005c0), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getresgid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000bc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@local, @in6=@remote}}, {{}, 0x0, @in6}}, &(0x7f0000000d00)=0x65) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) geteuid() getresgid(&(0x7f0000000280), &(0x7f0000000200), &(0x7f0000001080)) getpgrp(0xffffffffffffffff) geteuid() getegid() gettid() lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000001400)='/dev/urandom\x00', 0x0, 0x0) getpid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000c80)=0xf64d1131) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003200)={{{@in, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getegid() 10:23:41 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:41 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:41 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:41 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:42 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:42 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:42 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:42 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:42 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:42 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:42 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:42 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:43 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:43 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:43 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:43 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:43 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:43 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:43 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:43 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:43 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:43 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:43 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:43 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:43 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:44 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:44 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:44 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 10:23:44 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) [ 251.824432] net_ratelimit: 12 callbacks suppressed [ 251.824443] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:23:44 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:44 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") [ 252.097653] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:23:44 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0x3) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) 10:23:44 executing program 0: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:44 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:44 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1b, &(0x7f0000000140)='securityppp0:-cpuset-[ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3, 0x0, 0x95, 0x0, 0x0, 0x3, 0x28004, 0x3, 0xd9bb, 0x0, 0x0, 0xb0, 0x0, 0x2, 0x4f, 0x0, 0x0, 0x3, 0x101, 0x0, 0x100, 0x7, 0x0, 0x3, 0x100, 0x73, 0x6, 0x0, 0x0, 0xf86c, 0x0, 0x7, 0x1ff, 0x0, 0x7, 0x10001, 0x0, 0x0, 0x1, @perf_config_ext={0x401, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x40, 0x1, 0x4, 0x86, 0x0, 0x8, 0x14000, 0x0, 0x8, 0x6, 0x2, 0x6, 0xaa, 0x100000001, 0xffff, 0x7, 0x0, 0x10001, 0xf3, 0xfffffffffffffffa, 0xda, 0x5, 0x0, 0x0, 0x0, 0x6f28, 0x8, 0x2, 0x6, 0x0, 0x9, 0x0, 0x7, 0x0, 0x10000, 0x2400, 0x0, 0x80000000, 0x1, @perf_config_ext, 0x80, 0x0, 0x401, 0x6, 0x0, 0x7, 0x4}, r0, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ea, 0x80000001, 0x0, 0x0, 0x0, 0x1, 0x981c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) [ 252.279798] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:23:44 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:44 executing program 0: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:44 executing program 0: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:44 executing program 3: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:44 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:44 executing program 4: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 4: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 5: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 3: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 0: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 2: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 4: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 0: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 2: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 3: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 4: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 5: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 2: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 0: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 4: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:45 executing program 5: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:46 executing program 0: gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) tkill(0x0, 0x0) pipe2(&(0x7f0000000280), 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000200)="428055a0690fef69dc00d9ce41ff0f8f082097cd0a370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 10:23:46 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000000180)}) geteuid() ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000180)=""/244) getegid() perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f0000000700)=""/4096, 0x1000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getegid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000640), 0x0, &(0x7f0000001900)}, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f000000b000), &(0x7f000000dfe0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:23:46 executing program 1: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:46 executing program 5: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:46 executing program 4: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000a00)='syz0\x00', 0x1ff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) pipe2(&(0x7f0000000440), 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f0000000680)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000940)}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000a00), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000a40)) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000240), &(0x7f0000000580)=0x2) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() setregid(0x0, 0x0) request_key(&(0x7f00000008c0)='pkcs7_test\x00', &(0x7f0000000880), &(0x7f0000000900)='/dev/ppp\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) request_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400), &(0x7f00000004c0)='\'\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rename(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00') syz_execute_func(&(0x7f0000000cc0)="428055a0876969ef69dc00d9c841ff0f1837370f38211ac4c19086d9f28fc9410feefac463dd6d700f0479fbfbe54175456436670f5a7b000f2e1a1a01c4217c2b0931a3b786e2989f7f") 10:23:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:46 executing program 5: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:46 executing program 4: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:47 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000000180)}) geteuid() ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000180)=""/244) getegid() perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f0000000700)=""/4096, 0x1000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getegid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000640), 0x0, &(0x7f0000001900)}, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f000000b000), &(0x7f000000dfe0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:23:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:47 executing program 4: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:47 executing program 5: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:47 executing program 3: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:47 executing program 4: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:47 executing program 5: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:47 executing program 1: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:47 executing program 0: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:47 executing program 3: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:48 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000000180)}) geteuid() ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000180)=""/244) getegid() perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f0000000700)=""/4096, 0x1000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getegid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000640), 0x0, &(0x7f0000001900)}, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f000000b000), &(0x7f000000dfe0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:23:48 executing program 1: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:48 executing program 5: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:48 executing program 0: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:48 executing program 3: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:48 executing program 1: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:48 executing program 5: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:48 executing program 0: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:49 executing program 5: getpgid(0xffffffffffffffff) rmdir(&(0x7f0000000580)='./file0\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) creat(&(0x7f0000000540)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001640)={{{@in=@rand_addr, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001780)={@local, @loopback}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000240), 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)=')vboxnet1userlosystem\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}}}, &(0x7f00000002c0)=0xe8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="44dca90b0000000f188a06000000c483396ee03d673667410f00e32ef24c0f2a0d00000000670f380b2926d9f5c481fc5be9c4021bf519c44109f4bf92000000") 10:23:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) 10:23:49 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x5100, &(0x7f0000000100)) 10:23:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 10:23:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:49 executing program 2: clock_getres(0x400000000000002, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000000180)}) geteuid() ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000180)=""/244) getegid() perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f0000000700)=""/4096, 0x1000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getegid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\x00', 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000640), 0x0, &(0x7f0000001900)}, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f000000b000), &(0x7f000000dfe0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:23:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 10:23:49 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x5100, &(0x7f0000000100)) 10:23:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x7}, &(0x7f0000000280)=0x14) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x8400}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x0, 0x3ff, 0x8, 0x3}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000100)={0x43, 0x9, 0x1, {0xbd, 0x7, 0x8, 0xa07, 0x7, 0x0, 0x1ff, 0x3, 0x4}}, 0x43) dup2(r0, 0xffffffffffffffff) 10:23:49 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x5100, &(0x7f0000000100)) 10:23:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 10:23:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) 10:23:49 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x5100, &(0x7f0000000100)) 10:23:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 10:23:49 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x5100, &(0x7f0000000100)) 10:23:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) 10:23:49 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) 10:23:49 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x5100, &(0x7f0000000100)) 10:23:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) 10:23:50 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x5100, &(0x7f0000000100)) 10:23:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) 10:23:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 10:23:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) 10:23:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 10:23:50 executing program 4: sysfs$2(0x3, 0x0, &(0x7f0000000200)=""/47) pipe(&(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:23:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) 10:23:50 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:23:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) 10:23:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 10:23:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 10:23:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) 10:23:50 executing program 2: getresgid(&(0x7f0000000780), &(0x7f0000000680), &(0x7f00000007c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="7efb198d34451a41474c750d207eb818", 0x10) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@dev}, &(0x7f0000000440)=0x14) pipe2(&(0x7f00000002c0), 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "6b9c856ba4fd2da3a4e3ba632c683892"}, 0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") 10:23:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 10:23:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000e15000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) 10:23:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@mpls_getroute={0x20, 0x1a, 0x401, 0x0, 0x0, {}, [@RTA_DST={0x4}]}, 0x20}}, 0x0) 10:23:50 executing program 1: msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180), &(0x7f0000000240)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") add_key(&(0x7f0000000280)='.request_key_auth\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffc) request_key(&(0x7f00000003c0)='id_legacy\x00', &(0x7f0000000480), &(0x7f00000004c0)='/dev/vcs\x00', 0xfffffffffffffffc) keyctl$unlink(0x9, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f00000001c0)) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080), &(0x7f00000000c0)='&\x00', 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0x0, 0x0) [ 258.389708] netlink: 'syz-executor3': attribute type 1 has an invalid length. 10:23:51 executing program 4: sysfs$2(0x3, 0x0, &(0x7f0000000200)=""/47) pipe(&(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:23:51 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() getgroups(0x0, &(0x7f0000000980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) getgroups(0x0, &(0x7f0000000b00)) syz_execute_func(&(0x7f0000000040)="c4a11dda1c82c401fddb7e99440f980af3f247f66300c482410deac461bdea39c4a3d97a10bf430f1f00c44235abc4c442612fa194000000") 10:23:51 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:23:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@mpls_getroute={0x20, 0x1a, 0x401, 0x0, 0x0, {}, [@RTA_DST={0x4}]}, 0x20}}, 0x0) [ 258.891678] netlink: 'syz-executor3': attribute type 1 has an invalid length. 10:23:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@mpls_getroute={0x20, 0x1a, 0x401, 0x0, 0x0, {}, [@RTA_DST={0x4}]}, 0x20}}, 0x0) 10:23:51 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() getgroups(0x0, &(0x7f0000000980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) getgroups(0x0, &(0x7f0000000b00)) syz_execute_func(&(0x7f0000000040)="c4a11dda1c82c401fddb7e99440f980af3f247f66300c482410deac461bdea39c4a3d97a10bf430f1f00c44235abc4c442612fa194000000") [ 259.053238] netlink: 'syz-executor3': attribute type 1 has an invalid length. 10:23:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@mpls_getroute={0x20, 0x1a, 0x401, 0x0, 0x0, {}, [@RTA_DST={0x4}]}, 0x20}}, 0x0) 10:23:51 executing program 2: getresgid(&(0x7f0000000780), &(0x7f0000000680), &(0x7f00000007c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="7efb198d34451a41474c750d207eb818", 0x10) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@dev}, &(0x7f0000000440)=0x14) pipe2(&(0x7f00000002c0), 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "6b9c856ba4fd2da3a4e3ba632c683892"}, 0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") [ 259.231034] netlink: 'syz-executor3': attribute type 1 has an invalid length. 10:23:51 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() getgroups(0x0, &(0x7f0000000980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) getgroups(0x0, &(0x7f0000000b00)) syz_execute_func(&(0x7f0000000040)="c4a11dda1c82c401fddb7e99440f980af3f247f66300c482410deac461bdea39c4a3d97a10bf430f1f00c44235abc4c442612fa194000000") 10:23:51 executing program 3: getresgid(&(0x7f0000000780), &(0x7f0000000680), &(0x7f00000007c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="7efb198d34451a41474c750d207eb818", 0x10) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@dev}, &(0x7f0000000440)=0x14) pipe2(&(0x7f00000002c0), 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "6b9c856ba4fd2da3a4e3ba632c683892"}, 0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") 10:23:51 executing program 1: msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180), &(0x7f0000000240)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") add_key(&(0x7f0000000280)='.request_key_auth\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffc) request_key(&(0x7f00000003c0)='id_legacy\x00', &(0x7f0000000480), &(0x7f00000004c0)='/dev/vcs\x00', 0xfffffffffffffffc) keyctl$unlink(0x9, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f00000001c0)) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080), &(0x7f00000000c0)='&\x00', 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0x0, 0x0) 10:23:51 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000200)=""/160, 0xa0}, 0x120) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/loop#\x00'}, 0x10) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000940)=0xe8) getegid() getuid() getgroups(0x0, &(0x7f0000000980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) getgroups(0x0, &(0x7f0000000b00)) syz_execute_func(&(0x7f0000000040)="c4a11dda1c82c401fddb7e99440f980af3f247f66300c482410deac461bdea39c4a3d97a10bf430f1f00c44235abc4c442612fa194000000") 10:23:51 executing program 4: sysfs$2(0x3, 0x0, &(0x7f0000000200)=""/47) pipe(&(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:23:52 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:23:52 executing program 0: getresgid(&(0x7f0000000780), &(0x7f0000000680), &(0x7f00000007c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="7efb198d34451a41474c750d207eb818", 0x10) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@dev}, &(0x7f0000000440)=0x14) pipe2(&(0x7f00000002c0), 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "6b9c856ba4fd2da3a4e3ba632c683892"}, 0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") 10:23:52 executing program 2: getresgid(&(0x7f0000000780), &(0x7f0000000680), &(0x7f00000007c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="7efb198d34451a41474c750d207eb818", 0x10) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@dev}, &(0x7f0000000440)=0x14) pipe2(&(0x7f00000002c0), 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "6b9c856ba4fd2da3a4e3ba632c683892"}, 0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") 10:23:52 executing program 3: getresgid(&(0x7f0000000780), &(0x7f0000000680), &(0x7f00000007c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="7efb198d34451a41474c750d207eb818", 0x10) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@dev}, &(0x7f0000000440)=0x14) pipe2(&(0x7f00000002c0), 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "6b9c856ba4fd2da3a4e3ba632c683892"}, 0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") 10:23:52 executing program 1: msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180), &(0x7f0000000240)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") add_key(&(0x7f0000000280)='.request_key_auth\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffc) request_key(&(0x7f00000003c0)='id_legacy\x00', &(0x7f0000000480), &(0x7f00000004c0)='/dev/vcs\x00', 0xfffffffffffffffc) keyctl$unlink(0x9, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f00000001c0)) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080), &(0x7f00000000c0)='&\x00', 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0x0, 0x0) 10:23:52 executing program 4: sysfs$2(0x3, 0x0, &(0x7f0000000200)=""/47) pipe(&(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 10:23:52 executing program 0: getresgid(&(0x7f0000000780), &(0x7f0000000680), &(0x7f00000007c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="7efb198d34451a41474c750d207eb818", 0x10) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@dev}, &(0x7f0000000440)=0x14) pipe2(&(0x7f00000002c0), 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "6b9c856ba4fd2da3a4e3ba632c683892"}, 0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") 10:23:52 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 10:23:53 executing program 2: getresgid(&(0x7f0000000780), &(0x7f0000000680), &(0x7f00000007c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="7efb198d34451a41474c750d207eb818", 0x10) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@dev}, &(0x7f0000000440)=0x14) pipe2(&(0x7f00000002c0), 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "6b9c856ba4fd2da3a4e3ba632c683892"}, 0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") 10:23:53 executing program 3: getresgid(&(0x7f0000000780), &(0x7f0000000680), &(0x7f00000007c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="7efb198d34451a41474c750d207eb818", 0x10) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@dev}, &(0x7f0000000440)=0x14) pipe2(&(0x7f00000002c0), 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "6b9c856ba4fd2da3a4e3ba632c683892"}, 0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") 10:23:53 executing program 1: msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180), &(0x7f0000000240)=0x20) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") add_key(&(0x7f0000000280)='.request_key_auth\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffc) request_key(&(0x7f00000003c0)='id_legacy\x00', &(0x7f0000000480), &(0x7f00000004c0)='/dev/vcs\x00', 0xfffffffffffffffc) keyctl$unlink(0x9, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f00000001c0)) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080), &(0x7f00000000c0)='&\x00', 0xfffffffffffffffd) keyctl$chown(0x4, 0x0, 0x0, 0x0) 10:23:53 executing program 4: keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") socket$xdp(0x2c, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000140)) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000300)=ANY=[]) syncfs(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000001c0), 0xa) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') 10:23:53 executing program 0: getresgid(&(0x7f0000000780), &(0x7f0000000680), &(0x7f00000007c0)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="7efb198d34451a41474c750d207eb818", 0x10) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@dev}, &(0x7f0000000440)=0x14) pipe2(&(0x7f00000002c0), 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x0, 0x0, "6b9c856ba4fd2da3a4e3ba632c683892"}, 0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") 10:23:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 4: keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") socket$xdp(0x2c, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000140)) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000300)=ANY=[]) syncfs(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000001c0), 0xa) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') 10:23:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:54 executing program 0: clock_getres(0x4000000000003, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x12, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) setresgid(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000540)={0xb, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000140)=@generic) 10:23:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:55 executing program 5: sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @broadcast}, &(0x7f0000003fc0)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000004040)={'icmp\x00'}, &(0x7f0000004080)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003d40)={&(0x7f00000023c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b80)}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$nbd(&(0x7f0000003dc0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000003f00)={&(0x7f0000003d80), 0xc, &(0x7f0000003ec0)={&(0x7f0000003e00)={0x14}, 0x14}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000380)) getpgrp(0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000004000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000003f80)) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) 10:23:55 executing program 3: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:55 executing program 1: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:23:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000fea000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x1, 0x0, [0x40000021, 0x3]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:23:55 executing program 1: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:23:55 executing program 4: keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") socket$xdp(0x2c, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000140)) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000300)=ANY=[]) syncfs(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000001c0), 0xa) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') 10:23:55 executing program 2: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:23:55 executing program 0: clock_getres(0x4000000000003, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x12, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) setresgid(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000540)={0xb, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000140)=@generic) 10:23:55 executing program 3: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:55 executing program 1: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:23:55 executing program 2: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:23:56 executing program 1: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:23:56 executing program 5: sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @broadcast}, &(0x7f0000003fc0)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000004040)={'icmp\x00'}, &(0x7f0000004080)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003d40)={&(0x7f00000023c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b80)}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$nbd(&(0x7f0000003dc0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000003f00)={&(0x7f0000003d80), 0xc, &(0x7f0000003ec0)={&(0x7f0000003e00)={0x14}, 0x14}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000380)) getpgrp(0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000004000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000003f80)) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) 10:23:56 executing program 2: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:23:56 executing program 1: sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @broadcast}, &(0x7f0000003fc0)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000004040)={'icmp\x00'}, &(0x7f0000004080)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003d40)={&(0x7f00000023c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b80)}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$nbd(&(0x7f0000003dc0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000003f00)={&(0x7f0000003d80), 0xc, &(0x7f0000003ec0)={&(0x7f0000003e00)={0x14}, 0x14}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000380)) getpgrp(0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000004000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000003f80)) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) 10:23:56 executing program 3: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:56 executing program 2: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:56 executing program 4: keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") socket$xdp(0x2c, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000140)) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000300)=ANY=[]) syncfs(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) write$nbd(0xffffffffffffffff, &(0x7f00000001c0), 0xa) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') 10:23:56 executing program 0: clock_getres(0x4000000000003, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x12, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) setresgid(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000540)={0xb, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000140)=@generic) 10:23:56 executing program 3: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:57 executing program 2: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:57 executing program 3: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:57 executing program 1: sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @broadcast}, &(0x7f0000003fc0)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000004040)={'icmp\x00'}, &(0x7f0000004080)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003d40)={&(0x7f00000023c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b80)}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$nbd(&(0x7f0000003dc0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000003f00)={&(0x7f0000003d80), 0xc, &(0x7f0000003ec0)={&(0x7f0000003e00)={0x14}, 0x14}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000380)) getpgrp(0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000004000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000003f80)) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) 10:23:57 executing program 5: sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @broadcast}, &(0x7f0000003fc0)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000004040)={'icmp\x00'}, &(0x7f0000004080)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003d40)={&(0x7f00000023c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b80)}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$nbd(&(0x7f0000003dc0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000003f00)={&(0x7f0000003d80), 0xc, &(0x7f0000003ec0)={&(0x7f0000003e00)={0x14}, 0x14}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000380)) getpgrp(0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000004000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000003f80)) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) 10:23:57 executing program 4: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:57 executing program 2: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:57 executing program 0: clock_getres(0x4000000000003, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x12, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/84, 0x54, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, 0x1c) setresgid(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000540)={0xb, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000140)=@generic) 10:23:57 executing program 3: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:58 executing program 4: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:58 executing program 2: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:58 executing program 3: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:58 executing program 1: sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @broadcast}, &(0x7f0000003fc0)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000004040)={'icmp\x00'}, &(0x7f0000004080)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003d40)={&(0x7f00000023c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b80)}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$nbd(&(0x7f0000003dc0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000003f00)={&(0x7f0000003d80), 0xc, &(0x7f0000003ec0)={&(0x7f0000003e00)={0x14}, 0x14}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000380)) getpgrp(0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000004000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000003f80)) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) 10:23:58 executing program 5: sysinfo(&(0x7f0000000140)=""/235) lremovexattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000003f40)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x2, 0x0, @broadcast}, &(0x7f0000003fc0)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000004040)={'icmp\x00'}, &(0x7f0000004080)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003d40)={&(0x7f00000023c0)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b80)}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$nbd(&(0x7f0000003dc0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000003f00)={&(0x7f0000003d80), 0xc, &(0x7f0000003ec0)={&(0x7f0000003e00)={0x14}, 0x14}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000380)) getpgrp(0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000004000)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000003f80)) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) 10:23:58 executing program 0: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:58 executing program 4: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:58 executing program 3: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:58 executing program 2: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:59 executing program 0: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:59 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:59 executing program 1: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:59 executing program 4: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:59 executing program 3: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:59 executing program 2: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:23:59 executing program 0: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:24:00 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:24:00 executing program 1: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:24:00 executing program 4: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:24:00 executing program 0: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:00 executing program 3: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:24:00 executing program 2: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:00 executing program 0: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:00 executing program 2: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:00 executing program 5: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:24:00 executing program 1: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:24:00 executing program 3: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:00 executing program 0: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:01 executing program 2: clock_gettime(0x0, &(0x7f0000000500)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000780), &(0x7f00000007c0)='cgroupsystem^\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:01 executing program 4: getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xffffffffffff4836, 0x82) memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, 0x0) 10:24:01 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mount$9p_rdma(&(0x7f0000000240)='1\t7.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=rdma,', {'port'}}) 10:24:01 executing program 3: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:01 executing program 2: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:01 executing program 5: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:01 executing program 3: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:01 executing program 4: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:01 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:01 executing program 2: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:01 executing program 5: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:01 executing program 3: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:01 executing program 4: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:01 executing program 2: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:01 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mount$9p_rdma(&(0x7f0000000240)='1\t7.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=rdma,', {'port'}}) 10:24:02 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mount$9p_rdma(&(0x7f0000000240)='1\t7.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=rdma,', {'port'}}) 10:24:02 executing program 5: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:02 executing program 4: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a40)={@local}, &(0x7f0000003a80)=0x14) accept4(0xffffffffffffffff, &(0x7f0000003ac0)=@hci, &(0x7f0000003b40)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003e40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0, &(0x7f0000005c40)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005c80)={@empty, @dev}, &(0x7f0000005cc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005d00), &(0x7f0000005d40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007740)={@multicast2, @remote}, &(0x7f0000007780)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007880)={@mcast2}, &(0x7f00000078c0)=0x14) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 10:24:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:02 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mount$9p_rdma(&(0x7f0000000240)='1\t7.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=rdma,', {'port'}}) 10:24:02 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:02 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mount$9p_rdma(&(0x7f0000000240)='1\t7.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=rdma,', {'port'}}) 10:24:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:02 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mount$9p_rdma(&(0x7f0000000240)='1\t7.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=rdma,', {'port'}}) 10:24:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:02 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mount$9p_rdma(&(0x7f0000000240)='1\t7.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=rdma,', {'port'}}) 10:24:02 executing program 3: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:03 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:03 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:03 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:03 executing program 0: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:03 executing program 5: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:24:03 executing program 3: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "030073663000001000", 'dummy0\x00', 'ifb0\x00', 'lo\x00', @broadcast, [], @broadcast, [], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@dev, 0xfffffffffffffffc}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}]}, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00', 0x19, 0x0, 0x90, [0x200001c0, 0x0, 0x0, 0x200001f0, 0x20000220], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:24:03 executing program 2: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f00000008c0)='./file0/file1\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000840)='./file0/file0\x00', &(0x7f00000006c0)=ANY=[], &(0x7f0000000780)='team\x00', 0x5, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000700)=0x6e) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000380)) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)=""/91) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000240)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), 0x8) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) fdatasync(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 10:24:04 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:04 executing program 0: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:04 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:04 executing program 5: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:24:04 executing program 3: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:05 executing program 2: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f00000008c0)='./file0/file1\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000840)='./file0/file0\x00', &(0x7f00000006c0)=ANY=[], &(0x7f0000000780)='team\x00', 0x5, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000700)=0x6e) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000380)) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)=""/91) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000240)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), 0x8) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) fdatasync(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 10:24:05 executing program 1: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f00000008c0)='./file0/file1\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000840)='./file0/file0\x00', &(0x7f00000006c0)=ANY=[], &(0x7f0000000780)='team\x00', 0x5, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000700)=0x6e) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000380)) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)=""/91) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000240)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), 0x8) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) fdatasync(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 10:24:05 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:05 executing program 0: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) fanotify_init(0x0, 0x0) syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000180)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 10:24:05 executing program 3: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:24:05 executing program 5: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:24:06 executing program 2: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f00000008c0)='./file0/file1\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000840)='./file0/file0\x00', &(0x7f00000006c0)=ANY=[], &(0x7f0000000780)='team\x00', 0x5, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000700)=0x6e) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000380)) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)=""/91) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000240)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), 0x8) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) fdatasync(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 10:24:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @broadcast}, &(0x7f0000000240)=0x2cf) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000040)) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/96, 0x60) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)) geteuid() getgroups(0x0, &(0x7f0000002340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) 10:24:06 executing program 1: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f00000008c0)='./file0/file1\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000840)='./file0/file0\x00', &(0x7f00000006c0)=ANY=[], &(0x7f0000000780)='team\x00', 0x5, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000700)=0x6e) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000380)) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)=""/91) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000240)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), 0x8) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) fdatasync(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 10:24:06 executing program 0: prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:06 executing program 3: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:24:06 executing program 0: prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:06 executing program 5: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:24:06 executing program 0: prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:06 executing program 2: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f00000008c0)='./file0/file1\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000840)='./file0/file0\x00', &(0x7f00000006c0)=ANY=[], &(0x7f0000000780)='team\x00', 0x5, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000700)=0x6e) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000380)) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)=""/91) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000240)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), 0x8) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) fdatasync(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 10:24:07 executing program 0: prctl$setname(0x29, &(0x7f00000000c0)='/dev/full\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:07 executing program 1: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0/../file0\x00') truncate(&(0x7f00000008c0)='./file0/file1\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) setxattr(&(0x7f0000000840)='./file0/file0\x00', &(0x7f00000006c0)=ANY=[], &(0x7f0000000780)='team\x00', 0x5, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000700)=0x6e) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000380)) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)=""/91) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000240)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000140), 0x8) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) fdatasync(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 10:24:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @broadcast}, &(0x7f0000000240)=0x2cf) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000040)) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/96, 0x60) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)) geteuid() getgroups(0x0, &(0x7f0000002340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) 10:24:07 executing program 0: syslog(0x0, &(0x7f00000002c0)=""/40, 0x28) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc3641ffaa32233333c4c2953c8e0909a30f7f7f3766460f3828853044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:24:07 executing program 0: syslog(0x0, &(0x7f00000002c0)=""/40, 0x28) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc3641ffaa32233333c4c2953c8e0909a30f7f7f3766460f3828853044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:24:07 executing program 3: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 10:24:07 executing program 5: syslog(0x0, &(0x7f00000002c0)=""/40, 0x28) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc3641ffaa32233333c4c2953c8e0909a30f7f7f3766460f3828853044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:24:07 executing program 0: syslog(0x0, &(0x7f00000002c0)=""/40, 0x28) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc3641ffaa32233333c4c2953c8e0909a30f7f7f3766460f3828853044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:24:07 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffd) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003500)={{{@in=@dev, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003800)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003840)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003940)={@loopback}, &(0x7f0000003980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000039c0)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003dc0)={&(0x7f0000000440), 0xc, &(0x7f0000003d80)={&(0x7f0000000280)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='uid_map\x00') ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) 10:24:08 executing program 5: syslog(0x0, &(0x7f00000002c0)=""/40, 0x28) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc3641ffaa32233333c4c2953c8e0909a30f7f7f3766460f3828853044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:24:08 executing program 0: syslog(0x0, &(0x7f00000002c0)=""/40, 0x28) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc3641ffaa32233333c4c2953c8e0909a30f7f7f3766460f3828853044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:24:08 executing program 1: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) io_setup(0x0, &(0x7f0000000240)) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getpriority(0x0, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:08 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @broadcast}, &(0x7f0000000240)=0x2cf) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000040)) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/96, 0x60) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)) geteuid() getgroups(0x0, &(0x7f0000002340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) 10:24:08 executing program 5: syslog(0x0, &(0x7f00000002c0)=""/40, 0x28) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc3641ffaa32233333c4c2953c8e0909a30f7f7f3766460f3828853044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 10:24:08 executing program 0: clock_gettime(0x9, &(0x7f0000000200)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) 10:24:08 executing program 5: clock_gettime(0x7, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da00fef69dc0f01ee263a2086d40000c041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)="737461746d02") ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xfffffffffffffffe) 10:24:08 executing program 3: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 10:24:08 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffd) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003500)={{{@in=@dev, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003800)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003840)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003940)={@loopback}, &(0x7f0000003980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000039c0)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003dc0)={&(0x7f0000000440), 0xc, &(0x7f0000003d80)={&(0x7f0000000280)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='uid_map\x00') ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) 10:24:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @broadcast}, &(0x7f0000000240)=0x2cf) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) dup(0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000040)) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/96, 0x60) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)) geteuid() getgroups(0x0, &(0x7f0000002340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) 10:24:09 executing program 1: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) io_setup(0x0, &(0x7f0000000240)) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getpriority(0x0, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:09 executing program 0: clock_gettime(0x9, &(0x7f0000000200)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) 10:24:09 executing program 5: clock_gettime(0x7, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da00fef69dc0f01ee263a2086d40000c041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)="737461746d02") ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xfffffffffffffffe) 10:24:09 executing program 3: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 10:24:09 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffd) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003500)={{{@in=@dev, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003800)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003840)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003940)={@loopback}, &(0x7f0000003980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000039c0)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003dc0)={&(0x7f0000000440), 0xc, &(0x7f0000003d80)={&(0x7f0000000280)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='uid_map\x00') ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) 10:24:10 executing program 4: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 10:24:10 executing program 1: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) io_setup(0x0, &(0x7f0000000240)) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getpriority(0x0, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:10 executing program 0: clock_gettime(0x9, &(0x7f0000000200)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) 10:24:10 executing program 5: clock_gettime(0x7, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da00fef69dc0f01ee263a2086d40000c041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)="737461746d02") ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xfffffffffffffffe) 10:24:10 executing program 3: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 10:24:10 executing program 4: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 10:24:10 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffd) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003500)={{{@in=@dev, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003800)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003840)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003940)={@loopback}, &(0x7f0000003980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000039c0)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003dc0)={&(0x7f0000000440), 0xc, &(0x7f0000003d80)={&(0x7f0000000280)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='uid_map\x00') ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) 10:24:11 executing program 1: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) io_setup(0x0, &(0x7f0000000240)) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) getpriority(0x0, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:11 executing program 0: clock_gettime(0x9, &(0x7f0000000200)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) 10:24:11 executing program 5: clock_gettime(0x7, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da00fef69dc0f01ee263a2086d40000c041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)="737461746d02") ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xfffffffffffffffe) 10:24:11 executing program 3: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 10:24:11 executing program 4: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 10:24:11 executing program 2: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 10:24:12 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffd) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003500)={{{@in=@dev, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003800)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003840)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003940)={@loopback}, &(0x7f0000003980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000039c0)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003dc0)={&(0x7f0000000440), 0xc, &(0x7f0000003d80)={&(0x7f0000000280)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='uid_map\x00') ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) 10:24:12 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6, &(0x7f0000000040), &(0x7f0000000100)=0x7) 10:24:12 executing program 5: getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) pipe(&(0x7f00000002c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)='@[\'$\x00'}, 0x30) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) pipe2(&(0x7f00000004c0), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)=ANY=[]) truncate(&(0x7f0000000200)='./file0\x00', 0x0) getpgrp(0x0) getpgrp(0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:12 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "57ca88398ad8cd29", "0832fac58ca2d1859754384d9c4051b3f7814675dc00980bb142a91e54d0e3e7"}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000003540)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), 0xb) getgid() getgroups(0x0, &(0x7f0000003640)) fstat(0xffffffffffffffff, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003d00)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:12 executing program 5: getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) pipe(&(0x7f00000002c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)='@[\'$\x00'}, 0x30) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) pipe2(&(0x7f00000004c0), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)=ANY=[]) truncate(&(0x7f0000000200)='./file0\x00', 0x0) getpgrp(0x0) getpgrp(0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:12 executing program 4: getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) pipe(&(0x7f00000002c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)='@[\'$\x00'}, 0x30) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) pipe2(&(0x7f00000004c0), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)=ANY=[]) truncate(&(0x7f0000000200)='./file0\x00', 0x0) getpgrp(0x0) getpgrp(0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:12 executing program 2: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 10:24:12 executing program 4: getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) pipe(&(0x7f00000002c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)='@[\'$\x00'}, 0x30) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) pipe2(&(0x7f00000004c0), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)=ANY=[]) truncate(&(0x7f0000000200)='./file0\x00', 0x0) getpgrp(0x0) getpgrp(0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:13 executing program 5: getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) pipe(&(0x7f00000002c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)='@[\'$\x00'}, 0x30) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) pipe2(&(0x7f00000004c0), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)=ANY=[]) truncate(&(0x7f0000000200)='./file0\x00', 0x0) getpgrp(0x0) getpgrp(0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:13 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffd) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003500)={{{@in=@dev, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003800)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003840)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003940)={@loopback}, &(0x7f0000003980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000039c0)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003dc0)={&(0x7f0000000440), 0xc, &(0x7f0000003d80)={&(0x7f0000000280)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='uid_map\x00') ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) 10:24:13 executing program 4: getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) pipe(&(0x7f00000002c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)='@[\'$\x00'}, 0x30) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) pipe2(&(0x7f00000004c0), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)=ANY=[]) truncate(&(0x7f0000000200)='./file0\x00', 0x0) getpgrp(0x0) getpgrp(0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:13 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "57ca88398ad8cd29", "0832fac58ca2d1859754384d9c4051b3f7814675dc00980bb142a91e54d0e3e7"}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000003540)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), 0xb) getgid() getgroups(0x0, &(0x7f0000003640)) fstat(0xffffffffffffffff, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003d00)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:13 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6, &(0x7f0000000040), &(0x7f0000000100)=0x7) 10:24:13 executing program 5: getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) pipe(&(0x7f00000002c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000300)='@[\'$\x00'}, 0x30) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) pipe2(&(0x7f00000004c0), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)=ANY=[]) truncate(&(0x7f0000000200)='./file0\x00', 0x0) getpgrp(0x0) getpgrp(0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 10:24:13 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6, &(0x7f0000000040), &(0x7f0000000100)=0x7) 10:24:13 executing program 2: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000500)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") accept4$inet6(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x1c, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)={@multicast1, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003500)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000003600)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000005500), &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003780)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003880)={0x0, @loopback, @multicast1}, &(0x7f00000038c0)=0xc) 10:24:13 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "57ca88398ad8cd29", "0832fac58ca2d1859754384d9c4051b3f7814675dc00980bb142a91e54d0e3e7"}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000003540)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), 0xb) getgid() getgroups(0x0, &(0x7f0000003640)) fstat(0xffffffffffffffff, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003d00)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:13 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6, &(0x7f0000000040), &(0x7f0000000100)=0x7) 10:24:14 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffd) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003500)={{{@in=@dev, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000003600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000037c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003800)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000003840)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003940)={@loopback}, &(0x7f0000003980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000039c0)={'vcan0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000003dc0)={&(0x7f0000000440), 0xc, &(0x7f0000003d80)={&(0x7f0000000280)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast1}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000080)=0xdf) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='uid_map\x00') ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') syz_open_dev$dspn(&(0x7f0000000c00)='/dev/dsp#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000c40)='/dev/input/mice\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000c80)='./file0\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/vsock\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000d00)='/dev/usbmon#\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000d40)='./file0\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000002240)='/dev/midi#\x00', 0x0, 0x0) 10:24:14 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6, &(0x7f0000000040), &(0x7f0000000100)=0x7) 10:24:14 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6, &(0x7f0000000040), &(0x7f0000000100)=0x7) 10:24:14 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "57ca88398ad8cd29", "0832fac58ca2d1859754384d9c4051b3f7814675dc00980bb142a91e54d0e3e7"}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000003540)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), 0xb) getgid() getgroups(0x0, &(0x7f0000003640)) fstat(0xffffffffffffffff, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003d00)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:14 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "57ca88398ad8cd29", "0832fac58ca2d1859754384d9c4051b3f7814675dc00980bb142a91e54d0e3e7"}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000003540)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), 0xb) getgid() getgroups(0x0, &(0x7f0000003640)) fstat(0xffffffffffffffff, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003d00)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:14 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "57ca88398ad8cd29", "0832fac58ca2d1859754384d9c4051b3f7814675dc00980bb142a91e54d0e3e7"}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000003540)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), 0xb) getgid() getgroups(0x0, &(0x7f0000003640)) fstat(0xffffffffffffffff, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003d00)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:14 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:14 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6, &(0x7f0000000040), &(0x7f0000000100)=0x7) 10:24:15 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "57ca88398ad8cd29", "0832fac58ca2d1859754384d9c4051b3f7814675dc00980bb142a91e54d0e3e7"}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000003540)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), 0xb) getgid() getgroups(0x0, &(0x7f0000003640)) fstat(0xffffffffffffffff, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003d00)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:15 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "57ca88398ad8cd29", "0832fac58ca2d1859754384d9c4051b3f7814675dc00980bb142a91e54d0e3e7"}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000003540)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), 0xb) getgid() getgroups(0x0, &(0x7f0000003640)) fstat(0xffffffffffffffff, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003d00)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:15 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "57ca88398ad8cd29", "0832fac58ca2d1859754384d9c4051b3f7814675dc00980bb142a91e54d0e3e7"}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000003540)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), 0xb) getgid() getgroups(0x0, &(0x7f0000003640)) fstat(0xffffffffffffffff, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003d00)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:15 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:15 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:16 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:16 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:16 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, &(0x7f0000000300)={0x0, 0x0, 'client1\x00', 0x0, "57ca88398ad8cd29", "0832fac58ca2d1859754384d9c4051b3f7814675dc00980bb142a91e54d0e3e7"}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000080), 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)) getgid() setxattr$trusted_overlay_redirect(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)='trusted.overlay.redirect\x00', &(0x7f00000040c0)='./file0\x00', 0x8, 0x0) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) getresgid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000003540)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), 0xb) getgid() getgroups(0x0, &(0x7f0000003640)) fstat(0xffffffffffffffff, &(0x7f0000003680)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003c00)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000003d00)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:16 executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r1, &(0x7f0000000180)=""/238, 0xee) 10:24:16 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') [ 283.963689] FS-Cache: Duplicate cookie detected [ 283.968640] FS-Cache: O-cookie c=00000000b29d082a [p=0000000078acd89e fl=222 nc=0 na=1] [ 283.976883] FS-Cache: O-cookie d=00000000d1d85a9f n=0000000070edb314 [ 283.983383] FS-Cache: O-key=[10] '34323934393635353239' [ 283.988947] FS-Cache: N-cookie c=00000000cd670890 [p=0000000078acd89e fl=2 nc=0 na=1] [ 283.996975] FS-Cache: N-cookie d=00000000d1d85a9f n=00000000910ab697 [ 284.003498] FS-Cache: N-key=[10] '34323934393635353239' 10:24:16 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r1, &(0x7f0000000180)=""/238, 0xee) 10:24:16 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:16 executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r1, &(0x7f0000000180)=""/238, 0xee) 10:24:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r1, &(0x7f0000000180)=""/238, 0xee) [ 284.330784] FS-Cache: Duplicate cookie detected [ 284.335660] FS-Cache: O-cookie c=00000000d1a7b79c [p=0000000078acd89e fl=222 nc=0 na=1] [ 284.335678] FS-Cache: O-cookie d=00000000d1d85a9f n=00000000f223027d [ 284.335685] FS-Cache: O-key=[10] '34323934393635353636' [ 284.355982] FS-Cache: N-cookie c=00000000b52d5148 [p=0000000078acd89e fl=2 nc=0 na=1] [ 284.363999] FS-Cache: N-cookie d=00000000d1d85a9f n=000000002f0f98a2 [ 284.370536] FS-Cache: N-key=[10] '34323934393635353636' 10:24:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r1, &(0x7f0000000180)=""/238, 0xee) 10:24:16 executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="160000006f0100010000000000000000000000000000"], 0x16) write$P9_RSTAT(r1, &(0x7f0000000700)={0x56, 0x7d, 0x1, {0x0, 0x4f, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1, '(', 0x5, 'rfdno', 0x5, 'rfdno', 0x11, 'vboxnet1trustedlo'}}, 0x56) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000800)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) write$P9_RGETATTR(r1, &(0x7f0000000900)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) rename(&(0x7f0000000040)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 10:24:17 executing program 2: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r1, &(0x7f0000000180)=""/238, 0xee) 10:24:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r1, &(0x7f0000000180)=""/238, 0xee) 10:24:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r1, &(0x7f0000000180)=""/238, 0xee) 10:24:17 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x4, 0xb, 0x6, 0x0, 0xffffffffffffff9c}, 0x2c) 10:24:17 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r1, &(0x7f0000000180)=""/238, 0xee) 10:24:17 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x4, 0xb, 0x6, 0x0, 0xffffffffffffff9c}, 0x2c) [ 284.807831] audit: type=1400 audit(1536834257.057:25): avc: denied { associate } for pid=14001 comm="syz-executor3" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 10:24:17 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) flistxattr(r1, &(0x7f0000000180)=""/238, 0xee) 10:24:17 executing program 2: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:17 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x4, 0xb, 0x6, 0x0, 0xffffffffffffff9c}, 0x2c) 10:24:17 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:17 executing program 0: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x4, 0xb, 0x6, 0x0, 0xffffffffffffff9c}, 0x2c) 10:24:17 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:18 executing program 5: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:18 executing program 2: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:18 executing program 0: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:18 executing program 3: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:18 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:18 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:18 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:18 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:19 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:19 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:19 executing program 5: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:19 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mkdir(&(0x7f0000000540)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000380)) mount$bpf(0x0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000680)='bpf\x00', 0x20000, &(0x7f0000000800)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x200c, &(0x7f0000000400)) 10:24:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bond_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@dev, @broadcast}, &(0x7f0000000b80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in, @in6}}, {{@in6=@loopback}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @multicast2, @multicast1}, &(0x7f0000000f00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @local, @multicast2}, &(0x7f0000000f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000012c0)={0x0, @loopback}, &(0x7f0000001300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'bcsf0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000380), 0xc, &(0x7f0000001c40)={&(0x7f0000001700)={0x14}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:24:19 executing program 2: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:19 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:19 executing program 3: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:19 executing program 0: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:19 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:19 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:20 executing program 5: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:20 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:20 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bond_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@dev, @broadcast}, &(0x7f0000000b80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in, @in6}}, {{@in6=@loopback}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @multicast2, @multicast1}, &(0x7f0000000f00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @local, @multicast2}, &(0x7f0000000f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000012c0)={0x0, @loopback}, &(0x7f0000001300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'bcsf0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000380), 0xc, &(0x7f0000001c40)={&(0x7f0000001700)={0x14}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:24:20 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:20 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:20 executing program 0: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bond_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@dev, @broadcast}, &(0x7f0000000b80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in, @in6}}, {{@in6=@loopback}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @multicast2, @multicast1}, &(0x7f0000000f00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @local, @multicast2}, &(0x7f0000000f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000012c0)={0x0, @loopback}, &(0x7f0000001300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'bcsf0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000380), 0xc, &(0x7f0000001c40)={&(0x7f0000001700)={0x14}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:24:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bond_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@dev, @broadcast}, &(0x7f0000000b80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in, @in6}}, {{@in6=@loopback}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @multicast2, @multicast1}, &(0x7f0000000f00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @local, @multicast2}, &(0x7f0000000f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000012c0)={0x0, @loopback}, &(0x7f0000001300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'bcsf0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000380), 0xc, &(0x7f0000001c40)={&(0x7f0000001700)={0x14}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:24:20 executing program 3: prctl$intptr(0x1d, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@alg={0xe0, 0x10, 0x0, 0x0, 0x0, {{'sha3-224\x00'}}}, 0xe0}}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004dc0)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getgid() socket$netlink(0x10, 0x3, 0x0) geteuid() getresgid(&(0x7f0000005980), &(0x7f00000059c0), &(0x7f0000005a00)) stat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000007240), &(0x7f0000007300)=0x1) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007200)={0x0, 0x1c9c380}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007400)={0x0, @multicast2, @loopback}, &(0x7f0000007440)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007480)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007540)={'vlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000079c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007a00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000007f80)=0xe8) 10:24:20 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bond_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@dev, @broadcast}, &(0x7f0000000b80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in, @in6}}, {{@in6=@loopback}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @multicast2, @multicast1}, &(0x7f0000000f00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @local, @multicast2}, &(0x7f0000000f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000012c0)={0x0, @loopback}, &(0x7f0000001300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'bcsf0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000380), 0xc, &(0x7f0000001c40)={&(0x7f0000001700)={0x14}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:24:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:21 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bond_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@dev, @broadcast}, &(0x7f0000000b80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in, @in6}}, {{@in6=@loopback}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @multicast2, @multicast1}, &(0x7f0000000f00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @local, @multicast2}, &(0x7f0000000f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000012c0)={0x0, @loopback}, &(0x7f0000001300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'bcsf0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000380), 0xc, &(0x7f0000001c40)={&(0x7f0000001700)={0x14}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:24:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) 10:24:21 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bond_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@dev, @broadcast}, &(0x7f0000000b80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in, @in6}}, {{@in6=@loopback}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @multicast2, @multicast1}, &(0x7f0000000f00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @local, @multicast2}, &(0x7f0000000f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000012c0)={0x0, @loopback}, &(0x7f0000001300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'bcsf0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000380), 0xc, &(0x7f0000001c40)={&(0x7f0000001700)={0x14}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:24:21 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:21 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:21 executing program 5: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14, 0x0) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_addrs=@hci}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@dev, @broadcast}, &(0x7f0000000c00)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000008c00), 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008d40)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000008e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000008e80)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000008f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000009280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000092c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009300), &(0x7f0000009340)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f000000bac0), 0x0, 0x0, &(0x7f000000bb40)={0x77359400}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bd80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bdc0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:21 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x4255b) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2c}]}, 0xe) 10:24:22 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bond_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@dev, @broadcast}, &(0x7f0000000b80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in, @in6}}, {{@in6=@loopback}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @multicast2, @multicast1}, &(0x7f0000000f00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @local, @multicast2}, &(0x7f0000000f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000012c0)={0x0, @loopback}, &(0x7f0000001300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'bcsf0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000380), 0xc, &(0x7f0000001c40)={&(0x7f0000001700)={0x14}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:24:22 executing program 0: clock_getres(0x9, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000007bc0)) recvmmsg(0xffffffffffffffff, &(0x7f00000079c0), 0x0, 0x0, &(0x7f0000007c00)) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000007cc0)) creat(&(0x7f0000007c80)='./file0\x00', 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000007c40)={'bond_slave_0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 10:24:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) 10:24:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) 10:24:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) 10:24:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bond_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@dev, @broadcast}, &(0x7f0000000b80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in, @in6}}, {{@in6=@loopback}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @multicast2, @multicast1}, &(0x7f0000000f00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @local, @multicast2}, &(0x7f0000000f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000012c0)={0x0, @loopback}, &(0x7f0000001300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'bcsf0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000380), 0xc, &(0x7f0000001c40)={&(0x7f0000001700)={0x14}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:24:22 executing program 3: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 10:24:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)) msgget$private(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) geteuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'bond_slave_1\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@dev, @broadcast}, &(0x7f0000000b80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in, @in6}}, {{@in6=@loopback}}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in, @in6=@loopback}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@dev}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ec0)={0x0, @multicast2, @multicast1}, &(0x7f0000000f00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @local, @multicast2}, &(0x7f0000000f80)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000000fc0)=@can, &(0x7f0000001040)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001080)={'irlan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000012c0)={0x0, @loopback}, &(0x7f0000001300)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001540)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'bcsf0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001c80)={&(0x7f0000000380), 0xc, &(0x7f0000001c40)={&(0x7f0000001700)={0x14}, 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000880)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0x4f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 10:24:22 executing program 5: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14, 0x0) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_addrs=@hci}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@dev, @broadcast}, &(0x7f0000000c00)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000008c00), 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008d40)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000008e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000008e80)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000008f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000009280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000092c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009300), &(0x7f0000009340)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f000000bac0), 0x0, 0x0, &(0x7f000000bb40)={0x77359400}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bd80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bdc0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:22 executing program 4: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(0x0) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) geteuid() 10:24:22 executing program 0: clock_getres(0x9, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000007bc0)) recvmmsg(0xffffffffffffffff, &(0x7f00000079c0), 0x0, 0x0, &(0x7f0000007c00)) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000007cc0)) creat(&(0x7f0000007c80)='./file0\x00', 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000007c40)={'bond_slave_0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 10:24:23 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:23 executing program 3: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 10:24:23 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 10:24:23 executing program 5: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14, 0x0) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_addrs=@hci}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@dev, @broadcast}, &(0x7f0000000c00)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000008c00), 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008d40)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000008e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000008e80)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000008f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000009280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000092c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009300), &(0x7f0000009340)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f000000bac0), 0x0, 0x0, &(0x7f000000bb40)={0x77359400}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bd80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bdc0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:23 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:23 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:23 executing program 4: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(0x0) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) geteuid() 10:24:23 executing program 0: clock_getres(0x9, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000007bc0)) recvmmsg(0xffffffffffffffff, &(0x7f00000079c0), 0x0, 0x0, &(0x7f0000007c00)) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000007cc0)) creat(&(0x7f0000007c80)='./file0\x00', 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000007c40)={'bond_slave_0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 10:24:24 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:24 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:24 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 10:24:24 executing program 3: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 10:24:24 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:24 executing program 5: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) eventfd(0x0) fchdir(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14, 0x0) ioctl$sock_ifreq(0xffffffffffffff9c, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_addrs=@hci}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000bc0)={@dev, @broadcast}, &(0x7f0000000c00)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000008c00), 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008d40)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000008e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000008e80)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000008f80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000009280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000092c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009300), &(0x7f0000009340)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f000000bac0), 0x0, 0x0, &(0x7f000000bb40)={0x77359400}) getsockname$packet(0xffffffffffffff9c, &(0x7f000000bd80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bdc0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 10:24:24 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:24 executing program 4: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(0x0) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) geteuid() 10:24:24 executing program 0: clock_getres(0x9, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000007bc0)) recvmmsg(0xffffffffffffffff, &(0x7f00000079c0), 0x0, 0x0, &(0x7f0000007c00)) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000340)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000007cc0)) creat(&(0x7f0000007c80)='./file0\x00', 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000007c40)={'bond_slave_0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 10:24:24 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:25 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:25 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x1011, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:24:25 executing program 3: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 10:24:25 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 10:24:25 executing program 1: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 10:24:25 executing program 5: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:25 executing program 4: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(0x0) keyctl$setperm(0xa, 0x0, 0x0) getpid() socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getresuid(&(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)) getgroups(0x0, &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001140)) getgroups(0x0, &(0x7f00000011c0)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getresgid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) geteuid() 10:24:25 executing program 5: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:25 executing program 0: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:25 executing program 0: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:25 executing program 5: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}, {0x6}]}, 0x10) 10:24:26 executing program 0: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:26 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x315440, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c8400f1837370f38211ac4c19086d9f28fd9410feefa4e2179fbe5e54175455d0f2e1a911a01660ff7f031a3b786e2989f7f") 10:24:26 executing program 5: clock_gettime(0x7fffffffffffffc, &(0x7f0000000440)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000940)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000005c0)=""/96) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 10:24:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}, {0x6}]}, 0x10) 10:24:26 executing program 1: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 10:24:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}, {0x6}]}, 0x10) 10:24:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}, {0x6}]}, 0x10) 10:24:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}, {0x6}]}, 0x10) 10:24:26 executing program 5: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}, {0x6}]}, 0x10) 10:24:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5}, {0x6}]}, 0x10) 10:24:26 executing program 5: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:27 executing program 5: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:27 executing program 1: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 10:24:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:27 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x315440, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c8400f1837370f38211ac4c19086d9f28fd9410feefa4e2179fbe5e54175455d0f2e1a911a01660ff7f031a3b786e2989f7f") 10:24:27 executing program 5: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:28 executing program 1: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:28 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x315440, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c8400f1837370f38211ac4c19086d9f28fd9410feefa4e2179fbe5e54175455d0f2e1a911a01660ff7f031a3b786e2989f7f") 10:24:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:28 executing program 3: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:28 executing program 1: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:28 executing program 5: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:28 executing program 3: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:28 executing program 1: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:28 executing program 5: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:28 executing program 3: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:29 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x315440, 0x0) syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c8400f1837370f38211ac4c19086d9f28fd9410feefa4e2179fbe5e54175455d0f2e1a911a01660ff7f031a3b786e2989f7f") 10:24:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:29 executing program 1: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0xa0000015}) close(r1) 10:24:29 executing program 5: r0 = socket$inet(0x15, 0x80005, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000012000), 0x0, &(0x7f0000000240)=[{0x10, 0x114, 0x6}], 0x10}, 0x0) 10:24:29 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)}, &(0x7f0000000340)=0x10) prctl$setname(0xf, &(0x7f0000000080)='.}\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)={@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xff01]}}, 0x8) 10:24:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000100)='t', 0x1, 0x0, &(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "7914084b165e9ec52f1595ab29ebf015f37b541a5750acb2ac95e9ad3962af352e5323b779821fa55ee14bf9"}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000534000), &(0x7f0000000080)=0x4) [ 297.041048] audit: type=1400 audit(1536834269.287:26): avc: denied { block_suspend } for pid=14527 comm="syz-executor1" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 10:24:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x22101, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) 10:24:29 executing program 1: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0xa0000015}) close(r1) 10:24:29 executing program 4: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0xa0000015}) close(r1) 10:24:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000534000), &(0x7f0000000080)=0x4) 10:24:29 executing program 4: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0xa0000015}) close(r1) 10:24:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000534000), &(0x7f0000000080)=0x4) 10:24:30 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x22101, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) 10:24:30 executing program 4: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0xa0000015}) close(r1) 10:24:30 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)}, &(0x7f0000000340)=0x10) prctl$setname(0xf, &(0x7f0000000080)='.}\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)={@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xff01]}}, 0x8) 10:24:30 executing program 1: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0xa0000015}) close(r1) 10:24:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x22101, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) 10:24:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000534000), &(0x7f0000000080)=0x4) 10:24:30 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x22101, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) 10:24:30 executing program 1: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0xa0000015}) close(r1) 10:24:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x22101, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) 10:24:30 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)}, &(0x7f0000000340)=0x10) prctl$setname(0xf, &(0x7f0000000080)='.}\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)={@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xff01]}}, 0x8) 10:24:30 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x22101, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41) [ 403.536114] rcu: INFO: rcu_preempt self-detected stall on CPU [ 403.542359] rcu: 1-...!: (10500 ticks this GP) idle=5be/1/0x4000000000000002 softirq=34496/34496 fqs=0 [ 403.552612] rcu: (t=10501 jiffies g=45353 q=14) [ 403.557489] rcu: rcu_preempt kthread starved for 10502 jiffies! g45353 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 403.568141] rcu: RCU grace-period kthread stack dump: [ 403.573330] rcu_preempt I22872 10 2 0x80000000 [ 403.578969] Call Trace: [ 403.581641] __schedule+0x86c/0x1ed0 [ 403.585372] ? __sched_text_start+0x8/0x8 [ 403.589527] ? __mod_timer+0x6f6/0x1870 [ 403.593515] ? add_timer_on+0x9f0/0x9f0 [ 403.597540] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 403.602659] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 403.607768] ? lockdep_hardirqs_on+0x421/0x5c0 [ 403.612356] ? trace_hardirqs_on+0xbd/0x310 [ 403.616680] ? kasan_check_read+0x11/0x20 [ 403.620831] ? prepare_to_swait_event+0x25a/0x800 [ 403.625676] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 403.631136] schedule+0xfe/0x460 [ 403.634519] ? __schedule+0x1ed0/0x1ed0 [ 403.638503] ? prepare_to_swait_event+0x25a/0x800 [ 403.643356] ? __init_swait_queue_head+0x150/0x150 [ 403.648291] ? __lockdep_init_map+0x105/0x590 [ 403.652791] ? lockdep_init_map+0x9/0x10 [ 403.656860] schedule_timeout+0x140/0x260 [ 403.661009] ? usleep_range+0x1a0/0x1a0 [ 403.664992] ? __next_timer_interrupt+0x1a0/0x1a0 [ 403.669846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.675394] rcu_gp_kthread+0x9d9/0x2310 [ 403.679481] ? rcu_gp_init+0x1830/0x1830 [ 403.683549] ? update_curr+0x344/0xbe0 [ 403.687441] ? graph_lock+0x170/0x170 [ 403.691243] ? __account_cfs_rq_runtime+0x790/0x790 [ 403.696265] ? __lock_acquire+0x7ec/0x4ec0 [ 403.700505] ? graph_lock+0x170/0x170 [ 403.704317] ? mark_held_locks+0x130/0x130 [ 403.708563] ? __lock_is_held+0xb5/0x140 [ 403.712623] ? __account_cfs_rq_runtime+0x790/0x790 [ 403.717667] ? set_next_entity+0x30c/0xc40 [ 403.721903] ? mark_held_locks+0x130/0x130 [ 403.726138] ? rcu_read_lock_sched_held+0x108/0x120 [ 403.731170] ? select_task_rq_fair+0x34f0/0x34f0 [ 403.735931] ? __enqueue_entity+0x10d/0x1f0 [ 403.740262] ? graph_lock+0x170/0x170 [ 403.744070] ? lock_repin_lock+0x121/0x430 [ 403.748311] ? graph_lock+0x170/0x170 [ 403.752120] ? put_prev_task_stop+0x1d0/0xa10 [ 403.756641] ? lock_repin_lock+0x120/0x430 [ 403.760890] ? _raw_spin_unlock_irq+0x27/0x80 [ 403.765384] ? _raw_spin_unlock_irq+0x27/0x80 [ 403.769882] ? lockdep_hardirqs_on+0x421/0x5c0 [ 403.774467] ? trace_hardirqs_on+0xbd/0x310 [ 403.778792] ? kasan_check_read+0x11/0x20 [ 403.782949] ? mark_held_locks+0x130/0x130 [ 403.787184] ? audit_add_watch+0x951/0xdc0 [ 403.791429] ? kasan_check_write+0x14/0x20 [ 403.795672] ? finish_task_switch+0x2f5/0x900 [ 403.800178] ? __switch_to_asm+0x40/0x70 [ 403.804422] ? preempt_notifier_register+0x200/0x200 [ 403.809524] ? __switch_to_asm+0x34/0x70 [ 403.813588] ? __switch_to_asm+0x34/0x70 [ 403.817665] ? __switch_to_asm+0x40/0x70 [ 403.821726] ? __switch_to_asm+0x40/0x70 [ 403.825788] ? __switch_to_asm+0x34/0x70 [ 403.829849] ? __switch_to_asm+0x40/0x70 [ 403.833911] ? __switch_to_asm+0x34/0x70 [ 403.838003] ? __switch_to_asm+0x34/0x70 [ 403.842069] ? __switch_to_asm+0x40/0x70 [ 403.846130] ? __switch_to_asm+0x40/0x70 [ 403.850201] ? __switch_to_asm+0x34/0x70 [ 403.854260] ? __switch_to_asm+0x40/0x70 [ 403.858328] ? __schedule+0x874/0x1ed0 [ 403.862217] ? __switch_to_asm+0x40/0x70 [ 403.866280] ? __switch_to_asm+0x40/0x70 [ 403.870357] ? graph_lock+0x170/0x170 [ 403.874177] ? __sched_text_start+0x8/0x8 [ 403.878344] ? find_held_lock+0x36/0x1c0 [ 403.882418] ? __kthread_parkme+0xce/0x1a0 [ 403.886670] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 403.891787] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 403.896900] ? lockdep_hardirqs_on+0x421/0x5c0 [ 403.901501] ? trace_hardirqs_on+0xbd/0x310 [ 403.905828] ? kasan_check_read+0x11/0x20 [ 403.910003] ? __kthread_parkme+0xce/0x1a0 [ 403.914255] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 403.919714] ? kasan_check_write+0x14/0x20 [ 403.923960] ? do_raw_spin_lock+0xc1/0x200 [ 403.928301] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 403.933416] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.938964] ? __kthread_parkme+0xfb/0x1a0 [ 403.943218] kthread+0x35a/0x420 [ 403.946592] ? rcu_gp_init+0x1830/0x1830 [ 403.950663] ? kthread_bind+0x40/0x40 [ 403.954470] ret_from_fork+0x3a/0x50 [ 403.958241] Sending NMI from CPU 1 to CPUs 0: [ 403.965349] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 2.353 msecs [ 403.966084] NMI backtrace for cpu 0 [ 403.966091] CPU: 0 PID: 14582 Comm: syz-executor4 Not tainted 4.19.0-rc3+ #13 [ 403.966099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.966103] RIP: 0010:native_write_msr+0xa/0x30 [ 403.966117] Code: 5d c3 0f 21 c8 5d c3 0f 21 d0 5d c3 0f 21 d8 5d c3 0f 21 f0 5d c3 0f 0b 0f 1f 84 00 00 00 00 00 55 89 f9 89 f0 48 89 e5 0f 30 <0f> 1f 44 00 00 5d c3 48 c1 e2 20 89 f6 48 09 d6 31 d2 e8 bf 1a 6e [ 403.966122] RSP: 0018:ffff8801dae07d30 EFLAGS: 00000046 [ 403.966131] RAX: 00000000000001a4 RBX: 0000000000000838 RCX: 0000000000000838 [ 403.966138] RDX: 0000000000000000 RSI: 00000000000001a4 RDI: 0000000000000838 [ 403.966144] RBP: ffff8801dae07d30 R08: ffff8801a2874380 R09: 0000000000000008 [ 403.966156] R10: fffffbfff14fb801 R11: 0000000000000001 R12: 00000000000001a4 [ 403.966162] R13: 0000000000000000 R14: 0000000000000000 R15: 7fffffffffffffff [ 403.966169] FS: 00007f17de630700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 403.966174] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 403.966180] CR2: 00007f0cdd36662c CR3: 00000001c2c69000 CR4: 00000000001406f0 [ 403.966187] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 403.966193] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 403.966196] Call Trace: [ 403.966199] [ 403.966203] native_apic_msr_write+0x5b/0x80 [ 403.966208] lapic_next_event+0x5a/0x90 [ 403.966212] clockevents_program_event+0x251/0x370 [ 403.966217] tick_program_event+0xb7/0x130 [ 403.966221] hrtimer_interrupt+0x368/0x780 [ 403.966226] smp_apic_timer_interrupt+0x1a1/0x760 [ 403.966231] ? smp_call_function_single_interrupt+0x650/0x650 [ 403.966235] ? interrupt_entry+0xb5/0xf0 [ 403.966240] ? trace_hardirqs_off_caller+0xbb/0x310 [ 403.966245] ? trace_hardirqs_off_caller+0xbb/0x310 [ 403.966250] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 403.966255] ? trace_hardirqs_on_caller+0x310/0x310 [ 403.966259] ? trace_hardirqs_on_caller+0x310/0x310 [ 403.966265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.966270] ? check_preemption_disabled+0x48/0x200 [ 403.966275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.966280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 403.966284] apic_timer_interrupt+0xf/0x20 [ 403.966287] [ 403.966292] RIP: 0010:xfrm_state_find+0x1d04/0x3620 [ 403.966306] Code: c7 c7 60 46 b1 88 c6 05 ee 44 6d 03 01 e8 af a9 ad fa e9 f3 e7 ff ff e8 4a 57 cb fa 0f 0b e8 43 57 cb fa 0f 0b e8 3c 57 cb fa 90 48 c7 c0 80 dd 32 8a c6 03 04 8b 00 41 89 c4 41 89 87 c0 fd [ 403.966310] RSP: 0018:ffff8801a296e5d0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 403.966321] RAX: 0000000000040000 RBX: ffffed003452dcfa RCX: ffffc90008010000 [ 403.966327] RDX: 0000000000040000 RSI: ffffffff86b37984 RDI: 0000000000000005 [ 403.966333] RBP: ffff8801a296ea38 R08: ffff8801a2874380 R09: 0000000000000002 [ 403.966339] R10: 0000000000000000 R11: ffff8801a2874380 R12: 0000000000000001 [ 403.966345] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8801a296ea10 [ 403.966349] ? xfrm_state_find+0x1d04/0x3620 [ 403.966354] ? print_usage_bug+0xc0/0xc0 [ 403.966358] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.966363] ? xfrm_state_afinfo_get_rcu+0x1b0/0x1b0 [ 403.966367] ? retint_kernel+0x2d/0x2d [ 403.966372] ? trace_hardirqs_on_caller+0xc0/0x310 [ 403.966377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.966381] ? trace_hardirqs_off+0x310/0x310 [ 403.966385] ? mark_held_locks+0xc7/0x130 [ 403.966390] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.966394] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.966399] ? retint_kernel+0x2d/0x2d [ 403.966402] ? graph_lock+0x170/0x170 [ 403.966407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.966412] ? check_preemption_disabled+0x48/0x200 [ 403.966417] ? check_preemption_disabled+0x48/0x200 [ 403.966421] ? __lock_is_held+0xb5/0x140 [ 403.966425] ? graph_lock+0x170/0x170 [ 403.966430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.966435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.966440] ? check_preemption_disabled+0x48/0x200 [ 403.966445] ? check_preemption_disabled+0x48/0x200 [ 403.966449] ? print_usage_bug+0xc0/0xc0 [ 403.966453] ? __lock_is_held+0xb5/0x140 [ 403.966458] xfrm_tmpl_resolve+0x3c0/0xe50 [ 403.966462] ? __xfrm_decode_session+0x140/0x140 [ 403.966466] ? graph_lock+0x170/0x170 [ 403.966471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.966476] ? check_preemption_disabled+0x48/0x200 [ 403.966481] ? check_preemption_disabled+0x48/0x200 [ 403.966485] ? print_usage_bug+0xc0/0xc0 [ 403.966489] ? mark_held_locks+0xc7/0x130 [ 403.966494] xfrm_resolve_and_create_bundle+0x184/0x2800 [ 403.966499] ? mark_held_locks+0xc7/0x130 [ 403.966503] ? xfrm_migrate+0x19d0/0x19d0 [ 403.966508] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.966512] ? trace_hardirqs_off+0x310/0x310 [ 403.966516] ? mark_held_locks+0x130/0x130 [ 403.966520] ? ip6_pol_route+0x400/0xd90 [ 403.966524] ? find_held_lock+0x36/0x1c0 [ 403.966529] ? xfrm_sk_policy_lookup+0x484/0x640 [ 403.966533] ? lock_downgrade+0x900/0x900 [ 403.966538] ? check_preemption_disabled+0x48/0x200 [ 403.966543] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 403.966547] ? kasan_check_read+0x11/0x20 [ 403.966552] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 403.966556] ? rcu_bh_qs+0xc0/0xc0 [ 403.966561] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 403.966566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.966571] ? xfrm_sk_policy_lookup+0x4ab/0x640 [ 403.966575] ? xfrm_selector_match+0xf90/0xf90 [ 403.966580] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 403.966584] ? xfrm_expand_policies+0x2ab/0x6f0 [ 403.966589] xfrm_lookup_with_ifid+0x39e/0x2b80 [ 403.966594] ? xfrm_lookup_with_ifid+0x39e/0x2b80 [ 403.966598] ? mark_held_locks+0xc7/0x130 [ 403.966602] ? xfrm_policy_lookup+0x80/0x80 [ 403.966607] ? ip6_dst_lookup_tail+0xbd6/0x1d60 [ 403.966612] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 403.966616] ? rcu_bh_qs+0xc0/0xc0 [ 403.966620] ? ip6_dst_lookup_tail+0xba3/0x1d60 [ 403.966633] ? __local_bh_enable_ip+0x160/0x260 [ 403.966639] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.966643] ? ip6_dst_lookup_tail+0x3c8/0x1d60 [ 403.966647] ? dst_output+0x180/0x180 [ 403.966651] ? mark_held_locks+0x130/0x130 [ 403.966656] ? graph_lock+0x170/0x170 [ 403.966660] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.966665] ? __lock_is_held+0xb5/0x140 [ 403.966669] xfrm_lookup_route+0x3c/0x1f0 [ 403.966673] ip6_dst_lookup_flow+0x1c6/0x270 [ 403.966677] ? ip6_dst_lookup+0x60/0x60 [ 403.966682] inet6_csk_route_socket+0x8bd/0x1020 [ 403.966687] ? inet6_csk_route_req+0x820/0x820 [ 403.966691] ? mark_held_locks+0xc7/0x130 [ 403.966696] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.966700] ? lockdep_hardirqs_on+0x19e/0x5c0 [ 403.966704] ? retint_kernel+0x2d/0x2d [ 403.966709] ? trace_hardirqs_on_caller+0xc0/0x310 [ 403.966714] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.966718] ? trace_hardirqs_off+0x310/0x310 [ 403.966723] inet6_csk_xmit+0x118/0x630 [ 403.966727] ? inet6_csk_xmit+0x118/0x630 [ 403.966731] ? inet6_csk_update_pmtu+0x190/0x190 [ 403.966735] ? retint_kernel+0x2d/0x2d [ 403.966740] ? udp6_set_csum+0xe1/0x5a0 [ 403.966744] l2tp_xmit_skb+0x1465/0x1860 [ 403.966749] ? l2tp_build_l2tpv3_header+0x400/0x400 [ 403.966754] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 403.966758] ? pppol2tp_sendmsg+0x45d/0x6c0 [ 403.966763] pppol2tp_sendmsg+0x4b1/0x6c0 [ 403.966767] ? pppol2tp_getsockopt+0x940/0x940 [ 403.966771] sock_sendmsg+0xd5/0x120 [ 403.966775] ___sys_sendmsg+0x51d/0x930 [ 403.966779] ? graph_lock+0x170/0x170 [ 403.966784] ? copy_msghdr_from_user+0x580/0x580 [ 403.966789] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.966793] ? lockdep_hardirqs_on+0x421/0x5c0 [ 403.966797] ? retint_kernel+0x2d/0x2d [ 403.966802] ? trace_hardirqs_on_caller+0xc0/0x310 [ 403.966807] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 403.966811] ? trace_hardirqs_off+0x310/0x310 [ 403.966815] ? ___might_sleep+0x1ed/0x300 [ 403.966820] ? arch_local_save_flags+0x40/0x40 [ 403.966824] ? __sys_sendmmsg+0x2e9/0x6d0 [ 403.966828] __sys_sendmmsg+0x246/0x6d0 [ 403.966833] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 403.966838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 403.966842] ? ipv6_setsockopt+0x84/0x170 [ 403.966846] ? __x64_sys_futex+0x47f/0x6a0 [ 403.966850] ? do_syscall_64+0x9a/0x820 [ 403.966855] ? do_syscall_64+0x9a/0x820 [ 403.966859] ? lockdep_hardirqs_on+0x421/0x5c0 [ 403.966864] ? trace_hardirqs_on+0xbd/0x310 [ 403.966869] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.966873] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 403.966878] __x64_sys_sendmmsg+0x9d/0x100 [ 403.966882] do_syscall_64+0x1b9/0x820 [ 403.966887] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 403.966892] ? syscall_return_slowpath+0x5e0/0x5e0 [ 403.966896] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 403.966901] ? trace_hardirqs_on_caller+0x310/0x310 [ 403.966906] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 403.966911] ? prepare_exit_to_usermode+0x291/0x3b0 [ 403.966915] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 403.966920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.966924] RIP: 0033:0x4572d9 [ 403.966936] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 403.966941] RSP: 002b:00007f17de62fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 403.966952] RAX: ffffffffffffffda RBX: 00007f17de6306d4 RCX: 00000000004572d9 [ 403.966958] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000007 [ 403.966964] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 403.966970] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 403.966976] R13: 00000000004d4ae8 R14: 00000000004c9062 R15: 0000000000000000 [ 403.966985] NMI backtrace for cpu 1 [ 404.897453] CPU: 1 PID: 14588 Comm: syz-executor5 Not tainted 4.19.0-rc3+ #13 [ 404.904820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.914175] Call Trace: [ 404.916759] [ 404.918977] dump_stack+0x1c4/0x2b4 [ 404.922613] ? dump_stack_print_info.cold.2+0x52/0x52 [ 404.927821] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 404.932837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.938905] nmi_cpu_backtrace.cold.3+0x63/0xa2 [ 404.943581] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 404.948778] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 404.954065] arch_trigger_cpumask_backtrace+0x14/0x20 [ 404.959259] rcu_dump_cpu_stacks+0x175/0x1c2 [ 404.963673] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 404.968700] print_cpu_stall.cold.78+0x2d3/0x524 [ 404.973470] ? rcu_dynticks_snap+0x30/0x30 [ 404.977711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 404.983250] ? check_preemption_disabled+0x48/0x200 [ 404.988266] ? check_preemption_disabled+0x48/0x200 [ 404.993291] ? rcu_test_sync_prims+0x30/0x30 [ 404.997711] ? __lock_is_held+0xb5/0x140 [ 405.001779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.007322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.012885] ? check_preemption_disabled+0x48/0x200 [ 405.017918] rcu_check_callbacks+0xfd9/0x1990 [ 405.022413] ? __lock_is_held+0xb5/0x140 [ 405.026487] ? rcu_cpu_stall_reset+0x220/0x220 [ 405.031088] ? graph_lock+0x170/0x170 [ 405.034889] ? __lock_acquire+0x7ec/0x4ec0 [ 405.039130] ? perf_swevent_hrtimer+0x405/0x510 [ 405.043803] ? print_usage_bug+0xc0/0xc0 [ 405.047874] ? graph_lock+0x170/0x170 [ 405.051677] ? find_held_lock+0x36/0x1c0 [ 405.055751] ? cpuacct_account_field+0x219/0x3d0 [ 405.060511] ? graph_lock+0x170/0x170 [ 405.064321] ? kasan_check_read+0x11/0x20 [ 405.068476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.074013] ? check_preemption_disabled+0x48/0x200 [ 405.079032] ? check_preemption_disabled+0x48/0x200 [ 405.084058] ? trace_hardirqs_off+0xb8/0x310 [ 405.088471] ? __lock_is_held+0xb5/0x140 [ 405.092534] ? trace_hardirqs_on+0x310/0x310 [ 405.096945] ? check_preemption_disabled+0x48/0x200 [ 405.101972] ? raise_softirq+0x199/0x420 [ 405.106042] ? raise_softirq_irqoff+0x2e0/0x2e0 [ 405.110718] ? account_system_index_time+0x333/0x5d0 [ 405.115831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.121371] ? check_preemption_disabled+0x48/0x200 [ 405.126394] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 405.131931] ? hrtimer_run_queues+0x9a/0x400 [ 405.136346] ? run_local_timers+0x19b/0x230 [ 405.140667] ? timer_clear_idle+0x90/0x90 [ 405.144820] ? irqtime_account_process_tick.isra.6+0x35b/0x490 [ 405.150799] ? account_process_tick+0x282/0x350 [ 405.155468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.161011] update_process_times+0x2d/0x70 [ 405.165337] tick_sched_handle+0x9f/0x180 [ 405.169490] tick_sched_timer+0x45/0x130 [ 405.173552] __hrtimer_run_queues+0x41c/0x10d0 [ 405.178153] ? tick_sched_do_timer+0x1a0/0x1a0 [ 405.182741] ? hrtimer_start_range_ns+0xe00/0xe00 [ 405.187590] ? pvclock_read_flags+0x160/0x160 [ 405.192099] ? trace_hardirqs_on+0x310/0x310 [ 405.196508] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 405.201534] ? kvm_clock_read+0x18/0x30 [ 405.205508] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 405.210532] ? ktime_get_update_offsets_now+0x3b6/0x550 [ 405.215903] ? do_timer+0x50/0x50 [ 405.219359] ? trace_hardirqs_on+0x310/0x310 [ 405.223776] ? do_raw_spin_lock+0xc1/0x200 [ 405.228021] hrtimer_interrupt+0x313/0x780 [ 405.232276] smp_apic_timer_interrupt+0x1a1/0x760 [ 405.237122] ? smp_reschedule_interrupt+0x109/0x650 [ 405.242146] ? smp_call_function_single_interrupt+0x650/0x650 [ 405.248037] ? interrupt_entry+0xb5/0xf0 [ 405.252102] ? trace_hardirqs_off_caller+0xbb/0x310 [ 405.257121] ? trace_hardirqs_off_caller+0xbb/0x310 [ 405.262144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.266997] ? trace_hardirqs_on_caller+0x310/0x310 [ 405.272016] ? trace_hardirqs_on_caller+0x310/0x310 [ 405.277032] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.282571] ? check_preemption_disabled+0x48/0x200 [ 405.287586] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.293133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.297995] apic_timer_interrupt+0xf/0x20 [ 405.302224] [ 405.304468] RIP: 0010:xfrm_state_find+0x1d10/0x3620 [ 405.309490] Code: 01 e8 af a9 ad fa e9 f3 e7 ff ff e8 4a 57 cb fa 0f 0b e8 43 57 cb fa 0f 0b e8 3c 57 cb fa f3 90 48 c7 c0 80 dd 32 8a c6 03 04 <8b> 00 41 89 c4 41 89 87 c0 fd ff ff 89 85 04 fc ff ff 41 83 e4 01 [ 405.328392] RSP: 0018:ffff8801c538e5d0 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 405.336103] RAX: ffffffff8a32dd80 RBX: ffffed0038a71cfa RCX: ffffc9000780c000 [ 405.343390] RDX: 0000000000040000 RSI: ffffffff86b37984 RDI: 0000000000000005 [ 405.350659] RBP: ffff8801c538ea38 R08: ffff8801d78b42c0 R09: 0000000000000002 [ 405.357927] R10: 0000000000000000 R11: ffff8801d78b42c0 R12: 0000000000000001 [ 405.365200] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8801c538ea10 [ 405.372486] ? xfrm_state_find+0x1d04/0x3620 [ 405.376912] ? print_usage_bug+0xc0/0xc0 [ 405.380990] ? lockdep_hardirqs_on+0x19e/0x5c0 [ 405.385573] ? init_tracer_tracefs+0x85a/0xad0 [ 405.390164] ? xfrm_state_afinfo_get_rcu+0x1b0/0x1b0 [ 405.395272] ? mark_held_locks+0xc7/0x130 [ 405.399425] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.404187] ? lockdep_hardirqs_on+0x19e/0x5c0 [ 405.408773] ? retint_kernel+0x2d/0x2d [ 405.412664] ? trace_hardirqs_on_caller+0xc0/0x310 [ 405.417594] ? retint_kernel+0x2d/0x2d [ 405.421491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.426248] ? trace_hardirqs_off+0x310/0x310 [ 405.430743] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.435500] ? trace_hardirqs_off+0x310/0x310 [ 405.439998] ? trace_hardirqs_off+0x310/0x310 [ 405.444498] ? graph_lock+0x170/0x170 [ 405.448303] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.453062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.458600] ? check_preemption_disabled+0x48/0x200 [ 405.463634] ? check_preemption_disabled+0x48/0x200 [ 405.468672] ? __lock_is_held+0xb5/0x140 [ 405.472739] ? graph_lock+0x170/0x170 [ 405.476542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.482085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.487632] ? check_preemption_disabled+0x48/0x200 [ 405.492659] ? check_preemption_disabled+0x48/0x200 [ 405.497683] ? print_usage_bug+0xc0/0xc0 [ 405.501755] ? __lock_is_held+0xb5/0x140 [ 405.505835] xfrm_tmpl_resolve+0x3c0/0xe50 [ 405.510099] ? __xfrm_decode_session+0x140/0x140 [ 405.514856] ? graph_lock+0x170/0x170 [ 405.518672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.524210] ? check_preemption_disabled+0x48/0x200 [ 405.529226] ? check_preemption_disabled+0x48/0x200 [ 405.534245] ? print_usage_bug+0xc0/0xc0 [ 405.538317] ? __lock_is_held+0xb5/0x140 [ 405.542387] xfrm_resolve_and_create_bundle+0x184/0x2800 [ 405.547899] ? __lock_acquire+0x7ec/0x4ec0 [ 405.552154] ? xfrm_migrate+0x19d0/0x19d0 [ 405.556328] ? mark_held_locks+0x130/0x130 [ 405.560579] ? ip6_pol_route+0x400/0xd90 [ 405.564656] ? find_held_lock+0x36/0x1c0 [ 405.568733] ? xfrm_sk_policy_lookup+0x484/0x640 [ 405.573495] ? lock_downgrade+0x900/0x900 [ 405.577648] ? check_preemption_disabled+0x48/0x200 [ 405.582675] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 405.588478] ? kasan_check_read+0x11/0x20 [ 405.592641] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 405.597926] ? rcu_bh_qs+0xc0/0xc0 [ 405.601470] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 405.606666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.612214] ? xfrm_sk_policy_lookup+0x4ab/0x640 [ 405.616981] ? xfrm_selector_match+0xf90/0xf90 [ 405.621564] ? ip6_pol_route_output+0x54/0x70 [ 405.626063] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 405.631082] ? xfrm_expand_policies+0x2ab/0x6f0 [ 405.635764] xfrm_lookup_with_ifid+0x39e/0x2b80 [ 405.640437] ? xfrm_lookup_with_ifid+0x39e/0x2b80 [ 405.645285] ? mark_held_locks+0xc7/0x130 [ 405.649444] ? xfrm_policy_lookup+0x80/0x80 [ 405.653769] ? ip6_dst_lookup_tail+0xbd6/0x1d60 [ 405.658461] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 405.663917] ? rcu_bh_qs+0xc0/0xc0 [ 405.667462] ? ip6_dst_lookup_tail+0xba3/0x1d60 [ 405.672140] ? __local_bh_enable_ip+0x160/0x260 [ 405.676821] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 405.682363] ? ip6_dst_lookup_tail+0x3c8/0x1d60 [ 405.687046] ? dst_output+0x180/0x180 [ 405.690854] ? mark_held_locks+0x130/0x130 [ 405.695131] ? graph_lock+0x170/0x170 [ 405.698944] ? save_stack+0xa9/0xd0 [ 405.702581] ? __lock_is_held+0xb5/0x140 [ 405.706667] xfrm_lookup_route+0x3c/0x1f0 [ 405.710842] ip6_dst_lookup_flow+0x1c6/0x270 [ 405.715256] ? ip6_dst_lookup+0x60/0x60 [ 405.719243] inet6_csk_route_socket+0x8bd/0x1020 [ 405.724007] ? inet6_csk_route_req+0x820/0x820 [ 405.728599] ? sk_dst_check+0x3ce/0x790 [ 405.732587] ? lock_downgrade+0x900/0x900 [ 405.736736] ? check_preemption_disabled+0x48/0x200 [ 405.741759] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 405.747559] ? kasan_check_read+0x11/0x20 [ 405.751712] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 405.756994] ? rcu_bh_qs+0xc0/0xc0 [ 405.760550] inet6_csk_xmit+0x118/0x630 [ 405.764524] ? inet6_csk_xmit+0x118/0x630 [ 405.768675] ? inet6_csk_update_pmtu+0x190/0x190 [ 405.773434] ? sock_def_write_space+0x9c0/0x9c0 [ 405.778111] ? lock_release+0x970/0x970 [ 405.782085] ? lock_release+0x970/0x970 [ 405.786060] ? arch_local_save_flags+0x40/0x40 [ 405.790664] ? udp6_set_csum+0xe1/0x5a0 [ 405.794660] l2tp_xmit_skb+0x1465/0x1860 [ 405.798738] ? l2tp_build_l2tpv3_header+0x400/0x400 [ 405.804003] ? copy_msghdr_from_user+0x2c1/0x580 [ 405.808766] ? pppol2tp_sendmsg+0x45d/0x6c0 [ 405.813093] pppol2tp_sendmsg+0x4b1/0x6c0 [ 405.817249] ? pppol2tp_getsockopt+0x940/0x940 [ 405.821836] sock_sendmsg+0xd5/0x120 [ 405.825552] ___sys_sendmsg+0x51d/0x930 [ 405.829526] ? graph_lock+0x170/0x170 [ 405.833332] ? copy_msghdr_from_user+0x580/0x580 [ 405.838094] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 405.842856] ? find_held_lock+0x36/0x1c0 [ 405.846930] ? __might_fault+0x12b/0x1e0 [ 405.851085] ? lock_downgrade+0x900/0x900 [ 405.855249] ? ___might_sleep+0x1ed/0x300 [ 405.859405] ? arch_local_save_flags+0x40/0x40 [ 405.864000] __sys_sendmmsg+0x246/0x6d0 [ 405.867987] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 405.872318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 405.877862] ? ipv6_setsockopt+0x84/0x170 [ 405.882037] ? __x64_sys_futex+0x47f/0x6a0 [ 405.886280] ? do_syscall_64+0x9a/0x820 [ 405.890257] ? do_syscall_64+0x9a/0x820 [ 405.894235] ? lockdep_hardirqs_on+0x421/0x5c0 [ 405.898825] ? trace_hardirqs_on+0xbd/0x310 [ 405.903162] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.908529] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 405.913994] __x64_sys_sendmmsg+0x9d/0x100 [ 405.918235] do_syscall_64+0x1b9/0x820 [ 405.922128] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 405.927500] ? syscall_return_slowpath+0x5e0/0x5e0 [ 405.932433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.937785] ? trace_hardirqs_on_caller+0x310/0x310 [ 405.942812] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 405.947840] ? prepare_exit_to_usermode+0x291/0x3b0 [ 405.952868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 405.957724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.962922] RIP: 0033:0x4572d9 [ 405.966119] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.985053] RSP: 002b:00007ff20b709c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 405.992767] RAX: ffffffffffffffda RBX: 00007ff20b70a6d4 RCX: 00000000004572d9 [ 406.000034] RDX: 0800000000000059 RSI: 0000000020005fc0 RDI: 0000000000000007 [ 406.007305] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 406.014602] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 406.021886] R13: 00000000004d4ae8 R14: 00000000004c9062 R15: 0000000000000000